First published: Tue Mar 01 2022(Updated: )
Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Protector | <1.69 |
Eaton has patched the security issue and new version of the affected software has been released. The latest version can be downloaded from below location: - Eaton IPP v1.69 https://www.eaton.com/us/en-us/products/backup-power-ups-surge-it-power-distribution/software-downloads.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23283 is a stored Cross Site Scripting vulnerability in Eaton Intelligent Power Protector (IPP) prior to version 1.69.
CVE-2021-23283 occurs due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.
The severity of CVE-2021-23283 is medium with a CVSS score of 5.4.
Eaton Intelligent Power Protector versions prior to 1.69 are affected by CVE-2021-23283.
To fix CVE-2021-23283, update Eaton Intelligent Power Protector to version 1.69 or higher.