Impact-Company-Logo-English Black-01-177x54

Welcome to the Schneider Electric corporate Website

  • Contact Schneider Electric Customer Care Support via chat, form or phone mentioning the following information:​

    • ​Email​
    • Phone number​
    • Country​
    • Organization name​
    • Product Line
    • ​Vulnerable Version​
    • Vulnerability type [CWE ID if available]​

    Please note: Providing personal information while reporting a vulnerability is optional and not mandatory. For more information on privacy and personal information usage, please refer to our Privacy Notice for Schneider Electric CERT & CPCERT

    > Contact the Technical Support
  • Contact Schneider Electric CPCERT Team

    PGP Public Key and Fingerprint: E38F 0E4A 8541 8B53 20A7 D84F 8233 2C33 CF9F 652C​

    Only submissions in English will be accepted.​

    Note: Security notifications will be released the second Tuesday of every month. By limiting our publish dates to once a month, we aim to help our customers plan ahead for patches.​

    Information to be included into your email:​

    Subject: Product Vulnerability Report - [title]​

    Body: ​

    • First Name: 
    • ​Last Name: ​
    • Email: ​
    • Phone number: 
    • Country: ​
    • Organization name (if applicable): ​
    • Source Type: ​
    • Product Line: ​
    • Vulnerable Version: ​
    • Vulnerability type [CWE ID if available]:

    Please note: Providing personal information while reporting a vulnerability is optional and not mandatory. For more information on privacy and personal information usage, please refer to our Privacy Notice for Schneider Electric CERT & CPCERT.

    Attachment: Encrypted report with the following information:​

    • Any special configuration required to reproduce the issue​
    • Step-by-step instructions to reproduce the issue​
    • Proof-of-concept or exploit code​
    • Impact of the issue, including how an attacker could exploit the issue​
    • Any other relevant information​
  • Contact Schneider Electric CPCERT Team by emailing CPCERT@se.com including the information mentioned below:

    PGP Public Key and Fingerprint: E38F 0E4A 8541 8B53 20A7 D84F 8233 2C33 CF9F 652C​

    Only submissions in English will be accepted.​

    Note: Security notifications will be released the second Tuesday of every month. By limiting our publish dates to once a month, we aim to help our customers plan ahead for patches.​

    Information to be included into your email:​

    Subject: Product Vulnerability Report - [title]​

    Body: ​

    • First Name: 
    • ​Last Name: ​
    • Email: ​
    • Phone number: 
    • Country: ​
    • Supplier Organization name: ​
    • Vulnerable Product/Component: ​
    • Vulnerable Version: ​
    • Vulnerability type [CWE ID if available]: ​​
    • CVE (if any):

    Please note: Providing personal information while reporting a vulnerability is optional and not mandatory. For more information on privacy and personal information usage, please refer to our Privacy Notice for Schneider Electric CERT & CPCERT

    Attachment: Encrypted report with the following information:​

    • Any special configuration required to reproduce the issue​
    • Step-by-step instructions to reproduce the issue​
    • Proof-of-concept or exploit code​
    • Impact of the issue, including how an attacker could exploit the issue​
    • Any other relevant information​

Vulnerabilities Management policies

Privacy Notice for Schneider Electric CERT and CPCERT

Need help?

Start here!

Find answers now. Search for a solution on your own, or connect with one of our experts.

Contact Support

Reach out to our customer care team to receive more information, technical support, assistance with complaints and more.

Where to buy?

Easily find the nearest Schneider Electric distributor in your location.

Browse FAQ

Get answers you need by browsing topic-related Frequently Asked Questions (FAQ).

Contact Sales

Start your sales inquiry online and an expert will connect with you.