First published: Fri Apr 01 2022(Updated: )
The vulnerability exists due to insufficient validation of input of certain resources within the IPM software. This issue affects: Intelligent Power Manager (IPM 1) versions prior to 1.70.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | <1.70 |
Eaton has patched these security issues and new versions of the affected software are released. The latest versions can be downloaded from below location: - Eaton IPM v1.70 – https://www.eaton.com/us/en-us/digital/brightlayer/brightlayer-data-centers-suite/disaster-avoidance-software.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23287 is a vulnerability that exists due to insufficient validation of input of certain resources within the IPM software.
CVE-2021-23287 affects Intelligent Power Manager (IPM 1) versions prior to 1.70.
CVE-2021-23287 has a severity rating of medium with a CVSS score of 5.4.
To fix CVE-2021-23287, it is recommended to upgrade Intelligent Power Manager (IPM 1) to version 1.70 or higher.
More information about CVE-2021-23287 can be found in the security advisory provided by Eaton: [link](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Intelligent-Power-Manager-Vulnerability-Advisory_1002a_V1.0.pdf).