First published: Tue Feb 08 2022(Updated: )
The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Protector | <1.69 |
Eaton has patched these security issues and new versions of the affected software are released. The latest versions can be downloaded from below location: - Eaton IPM v1.69 – https://www.eaton.com/us/en-us/catalog/backup-power-ups-surge-it-power-distribution/eaton-intelligent-power-protector.resources.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-23288.
The severity of CVE-2021-23288 is medium with a CVSS score of 4.8.
This vulnerability occurs due to insufficient validation of input from certain resources by the IPP software.
This vulnerability affects Intelligent Power Protector versions prior to 1.69.
To exploit this vulnerability, the attacker would need access to the local Subnet and an administrator interaction.
Yes, the fix for this vulnerability is to update Intelligent Power Protector to version 1.69 or later.