Description
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
Published: 2021-04-13
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

upgrade the software to latest version 1.69


Vendor Workaround

To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-10376 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
History

No history.

Subscriptions

Eaton Intelligent Power Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2024-09-17T02:41:57.724Z

Reserved: 2021-01-08T00:00:00.000Z

Link: CVE-2021-23281

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-13T19:15:15.037

Modified: 2024-11-21T05:51:29.650

Link: CVE-2021-23281

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses