Description
The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton

Network M3

which is available on the Eaton download center.
Published: 2026-02-09
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Eaton
Eaton network M3
Vendors & Products Eaton
Eaton network M3

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Description The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton Network M3 which is available on the Eaton download center.
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L'}


Subscriptions

Eaton Network M3
cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2026-02-09T16:10:46.212Z

Reserved: 2026-01-08T04:55:11.726Z

Link: CVE-2026-22613

cve-icon Vulnrichment

Updated: 2026-02-09T16:10:42.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-09T06:16:24.360

Modified: 2026-02-09T16:08:35.290

Link: CVE-2026-22613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-10T12:23:58Z

Weaknesses