Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Eaton
Published: 2021-04-13T18:03:54.932478Z
Updated: 2024-09-17T02:41:57.724Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23281
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-04-13T19:15:15.037
Modified: 2024-11-21T05:51:29.650
Link: CVE-2021-23281
Redhat
No data.