Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The
vulnerability exists due to insufficient validation of input from certain resources by the IPM software.
The attacker would need access to the local Subnet and an administrator interaction to compromise
the system
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10377 Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The vulnerability exists due to insufficient validation of input from certain resources by the IPM software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system
Fixes

Solution

Eaton has patched these security issues and an updated version (v1.70) of the IPM v1 software has been released.


Workaround

No workaround given by the vendor.

History

Mon, 25 Nov 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 09:00:00 +0000

Type Values Removed Values Added
Description Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The vulnerability exists due to insufficient validation of input from certain resources by the IPM software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system
Title Stored Cross-site Scripting reported in Intelligent Power Manager v1
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2024-11-25T13:57:58.441Z

Reserved: 2021-01-08T22:01:48.663Z

Link: CVE-2021-23282

cve-icon Vulnrichment

Updated: 2024-11-25T13:57:55.367Z

cve-icon NVD

Status : Received

Published: 2024-11-25T09:15:04.350

Modified: 2024-11-25T09:15:04.350

Link: CVE-2021-23282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses