Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10376 | Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code. |
Fixes
Solution
upgrade the software to latest version 1.69
Workaround
To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-17T02:41:57.724Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23281
No data.
Status : Modified
Published: 2021-04-13T19:15:15.037
Modified: 2024-11-21T05:51:29.650
Link: CVE-2021-23281
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD