First published: Thu May 07 2020(Updated: )
Improper Input Validation in Eaton's Intelligent Power Manager (IPM) v 1.67 & prior on file name during configuration file import functionality allows attackers to perform command injection or code execution via specially crafted file names while uploading the configuration file in the application.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | ||
Eaton Intelligent Power Manager | <=1.67 |
Update the software to latest version 1.68.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-6651.
The title of this vulnerability is Eaton Intelligent Power Manager mc2 Command Injection Remote Code Execution Vulnerability.
The severity of CVE-2020-6651 is high with a severity value of 8.8.
The Eaton Intelligent Power Manager software is affected by this vulnerability.
An attacker can exploit this vulnerability by executing arbitrary code on affected installations of Eaton Intelligent Power Manager.