First published: Thu May 07 2020(Updated: )
Incorrect Privilege Assignment vulnerability in Eaton's Intelligent Power Manager (IPM) v1.67 & prior allow non-admin users to upload the system configuration files by sending specially crafted requests. This can result in non-admin users manipulating the system configurations via uploading the configurations with incorrect parameters.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | ||
Eaton Intelligent Power Manager | <=1.67 |
Upgrade to the latest version 1.68 available on eaton.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-6652.
The severity of CVE-2020-6652 is high with a CVSS score of 7.8.
The Eaton Intelligent Power Manager with a version up to 1.67 is affected by CVE-2020-6652.
An attacker can exploit CVE-2020-6652 by escalating privileges on affected installations of Eaton Intelligent Power Manager.
Yes, authentication is required to exploit CVE-2020-6652.