Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10374 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed. |
Fixes
Solution
upgrade the software to latest version 1.69
Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T17:18:54.414Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23279
No data.
Status : Modified
Published: 2021-04-13T19:15:14.883
Modified: 2024-11-21T05:51:29.413
Link: CVE-2021-23279
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD