First published: Fri Oct 28 2022(Updated: )
A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation’s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html .
Credit: CybersecurityCOE@eaton.com CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Foreseer Electrical Power Monitoring System | >=4.0<7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33859 is critical with a score of 9.8.
The Eaton Foreseer EPMS software versions 4.0 to 7.6 are affected by CVE-2022-33859.
The CWE ID for CVE-2022-33859 is CWE-434.
CVE-2022-33859 allows a threat actor to upload arbitrary files and can lead to unauthorized access and potential disruption of the Foreseer EPMS software.
You can find more information about CVE-2022-33859 on the Eaton website at https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html.