First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 | |
Eaton Intelligent Power Manager Virtual Appliance | <1.69 | |
Eaton Intelligent Power Protector | <1.68 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-23276.
The severity of CVE-2021-23276 is high with a severity value of 8.8.
CVE-2021-23276 affects Eaton Intelligent Power Manager (IPM) prior to version 1.69.
CVE-2021-23276 affects Eaton Intelligent Power Manager Virtual Appliance prior to version 1.69.
CVE-2021-23276 affects Eaton Intelligent Power Protector prior to version 1.68.
Successful exploitation of CVE-2021-23276 can allow attackers to add users to the database.
Yes, authenticated access is required to exploit CVE-2021-23276.
Upgrade Eaton Intelligent Power Manager (IPM) to version 1.69 or newer, Eaton Intelligent Power Manager Virtual Appliance to version 1.69 or newer, or Eaton Intelligent Power Protector to version 1.68 or newer.
You can find more information about CVE-2021-23276 at the following link: https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-intelligent-power-manager-ipm-vulnerability-advisory.pdf