First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 | |
Eaton Intelligent Power Manager Virtual Appliance | <1.69 | |
Eaton Intelligent Power Protector | <1.68 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-23278.
CVE-2021-23278 has a severity rating of 9.6 (critical).
Eaton Intelligent Power Manager prior to version 1.69, Eaton Intelligent Power Manager Virtual Appliance prior to version 1.69, and Eaton Intelligent Power Protector prior to version 1.68 are affected.
CVE-2021-23278 is classified under CWE-20 (Improper Input Validation).
An attacker can exploit the vulnerability by sending specially crafted requests to specific server scripts in Eaton Intelligent Power Manager, leading to arbitrary file deletion.