lead attackers to identify and access vulnerable systems.
No analysis available yet.
Vendor Solution
Eaton has remediated the vulnerabilities in IPP software version 1.71.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-36901 | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. |
Mon, 25 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton intelligent Power Protector |
|
| CPEs | cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eaton
Eaton intelligent Power Protector |
|
| Metrics |
ssvc
|
Mon, 25 Nov 2024 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. | |
| Title | Improper access control mechanism in IPP | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-11-25T13:56:45.587Z
Reserved: 2022-06-15T21:05:25.314Z
Link: CVE-2022-33862
Updated: 2024-11-25T13:56:41.927Z
Status : Received
Published: 2024-11-25T09:15:05.440
Modified: 2024-11-25T09:15:05.440
Link: CVE-2022-33862
No data.
OpenCVE Enrichment
No data.
EUVD