First published: Mon Apr 18 2022(Updated: )
Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to Stored Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager Infrastructure | <=1.5.0plus205 |
The product has reached its End Of Life, the notification has been posted at: Lifecycle Notification. Check References section. The transition to IPM Monitor Edition is in progress. Refer the Product page for further details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23284 is a vulnerability in Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions that allows for Stored Cross-site Scripting attacks.
CVE-2021-23284 affects all versions of Eaton Intelligent Power Manager Infrastructure up to and including version 1.5.0plus205, allowing for Stored Cross-site Scripting attacks.
CVE-2021-23284 has a severity rating of 'medium' with a CVSS score of 4.8.
To fix CVE-2021-23284, users should update to a version of Eaton Intelligent Power Manager Infrastructure that is not affected by the vulnerability.
More information about CVE-2021-23284 can be found in the Eaton Intelligent Power Manager (IPM) Infrastructure Vulnerability Advisory and the Eaton IPM Infrastructure End-of-Life Memo.