This vulnerability allows remote attackers to escalate privileges on affected installations of Eaton Intelligent Power Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the mc2 binary. The issue results from the lack of proper validation of user privileges prior to performing privileged actions. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from non-admin users.
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager Virtual Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-650 is considered high due to the potential for remote privilege escalation.
To mitigate ZDI-20-650, update Eaton Intelligent Power Manager to the latest version where the vulnerability has been addressed.
Organizations using Eaton Intelligent Power Manager are affected by the ZDI-20-650 vulnerability.
ZDI-20-650 can enable remote attackers to escalate privileges on affected systems.
Yes, authentication is required to exploit the ZDI-20-650 vulnerability.