First published: Tue Apr 13 2021(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.69 |
upgrade the software to latest version 1.69
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-23281.
The severity of CVE-2021-23281 is critical with a severity value of 10.
Eaton Intelligent Power Manager (IPM) prior to version 1.69 is affected by CVE-2021-23281.
An attacker can exploit CVE-2021-23281 by sending a specially crafted packet to make IPM connect to a remote code execution vulnerability.
Yes, a fix for CVE-2021-23281 is available in version 1.69 of Eaton Intelligent Power Manager (IPM) software.