lead attackers to identify and access vulnerable systems.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-36901 | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. |
Solution
Eaton has remediated the vulnerabilities in IPP software version 1.71.
Workaround
No workaround given by the vendor.
Mon, 25 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton intelligent Power Protector |
|
| CPEs | cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eaton
Eaton intelligent Power Protector |
|
| Metrics |
ssvc
|
Mon, 25 Nov 2024 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. | |
| Title | Improper access control mechanism in IPP | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-11-25T13:56:45.587Z
Reserved: 2022-06-15T21:05:25.314Z
Link: CVE-2022-33862
Updated: 2024-11-25T13:56:41.927Z
Status : Received
Published: 2024-11-25T09:15:05.440
Modified: 2024-11-25T09:15:05.440
Link: CVE-2022-33862
No data.
OpenCVE Enrichment
No data.
EUVD