First published: Fri Apr 01 2022(Updated: )
Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to CSV Formula Injection. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <=1.5.0plus205 |
The product has reached its End Of Life, the notification has been posted at: Lifecycle Notification: The transition to IPM Monitor Edition is in progress. Refer the Product page for further details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-23286.
The title of this vulnerability is Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions CSV Formula Injection.
The severity of CVE-2021-23286 is high with a severity value of 8.
CVE-2021-23286 allows attackers to inject CSV formulas, potentially leading to arbitrary code execution or data disclosure in Eaton Intelligent Power Manager Infrastructure versions 1.5.0plus205 and prior.
At the time of this advisory, there are no known fixes or patches available for CVE-2021-23286. It is recommended to follow the recommendations provided by the vendor and apply any security updates as soon as they become available.