Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-10378 | Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software. |
Fixes
Solution
Eaton has patched the security issue and new version of the affected software has been released. The latest version can be downloaded from below location: - Eaton IPP v1.69 https://www.eaton.com/us/en-us/products/backup-power-ups-surge-it-power-distribution/software-downloads.html
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-17T02:46:39.591Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23283

No data.

Status : Modified
Published: 2022-04-19T21:15:12.623
Modified: 2024-11-21T05:51:29.763
Link: CVE-2021-23283

No data.

No data.