Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10373 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed. |
Fixes
Solution
upgrade the software to latest version 1.69
Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T20:11:36.112Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23278
No data.
Status : Modified
Published: 2021-04-13T19:15:14.820
Modified: 2024-11-21T05:51:29.297
Link: CVE-2021-23278
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD