First published: Mon Apr 18 2022(Updated: )
Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to reflected Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <=1.5.0plus205 |
The product has reached its End Of Life, the notification has been posted at: Lifecycle Notification: The transition to IPM Monitor Edition is in progress. Refer the Product page for further details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-23285.
The severity of CVE-2021-23285 is medium with a CVSS score of 4.8.
The affected software is Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions.
This vulnerability could allow an attacker to execute arbitrary script code in the victim's browser, potentially leading to unauthorized access or data theft.
To fix CVE-2021-23285, it is recommended to upgrade to a patched version of Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure).