No analysis available yet.
Vendor Solution
upgrade the software to latest version 1.69
Vendor Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10375 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability. |
No history.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-16T17:24:07.762Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23280
No data.
Status : Modified
Published: 2021-04-13T19:15:14.960
Modified: 2024-11-21T05:51:29.533
Link: CVE-2021-23280
No data.
OpenCVE Enrichment
No data.
EUVD