First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 | |
Eaton Intelligent Power Manager Virtual Appliance | <1.69 | |
Eaton Intelligent Power Protector | <1.68 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-23277 is critical (severity value of 10).
Eaton Intelligent Power Manager (IPM) prior to version 1.69, Eaton Intelligent Power Manager Virtual Appliance prior to version 1.69, and Eaton Intelligent Power Protector prior to version 1.68 are affected by CVE-2021-23277.
The vulnerability in Eaton Intelligent Power Manager (IPM) is an unauthenticated eval injection vulnerability.
The unauthenticated eval injection vulnerability in Eaton Intelligent Power Manager (IPM) can be exploited by injecting malicious code syntax in the dynamic evaluation call in the loadUserFile function under scripts/libs/utils.js.
Yes, there is a security advisory available for CVE-2021-23277. You can find it at the following reference link: [Eaton Intelligent Power Manager (IPM) Vulnerability Advisory](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-intelligent-power-manager-ipm-vulnerability-advisory.pdf).