No analysis available yet.
Vendor Solution
upgrade the software to latest version 1.69
Vendor Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10372 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands. |
No history.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T18:38:30.132Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23277
No data.
Status : Modified
Published: 2021-04-13T19:15:14.740
Modified: 2024-11-21T05:51:29.183
Link: CVE-2021-23277
No data.
OpenCVE Enrichment
No data.
EUVD