Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-10372 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands. |
Fixes
Solution
upgrade the software to latest version 1.69
Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
References
History
No history.

Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T18:38:30.132Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23277

No data.

Status : Modified
Published: 2021-04-13T19:15:14.740
Modified: 2024-11-21T05:51:29.183
Link: CVE-2021-23277

No data.

No data.