First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 | |
Eaton Intelligent Power Manager Virtual Appliance | <1.69 | |
Eaton Intelligent Power Protector | <1.68 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-23279.
The title of this vulnerability is 'Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID'.
The severity of CVE-2021-23279 is critical, with a severity value of 10.
Eaton Intelligent Power Manager (IPM) versions prior to 1.69, Eaton Intelligent Power Manager Virtual Appliance versions prior to 1.69, and Eaton Intelligent Power Protector versions prior to 1.68 are affected by CVE-2021-23279.
An attacker can exploit CVE-2021-23279 by sending specially crafted packets to delete arbitrary files in the affected software.