First published: Mon Nov 25 2024(Updated: )
Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The vulnerability exists due to insufficient validation of input from certain resources by the IPM software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager Virtual Appliance | <1.70 |
Eaton has patched these security issues and an updated version (v1.70) of the IPM v1 software has been released.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23282 is considered a medium severity vulnerability due to its stored cross-site scripting flaw.
To fix CVE-2021-23282, upgrade Eaton Intelligent Power Manager to version 1.70 or later.
CVE-2021-23282 is a stored cross-site scripting vulnerability.
CVE-2021-23282 affects users of Eaton Intelligent Power Manager prior to version 1.70.
An attacker needs access to the local subnet and administrative credentials to exploit CVE-2021-23282.