Network M3
which is available on the Eaton download center.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton network M3 |
|
| Vendors & Products |
Eaton
Eaton network M3 |
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton Network M3 which is available on the Eaton download center. | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2026-02-09T16:10:46.212Z
Reserved: 2026-01-08T04:55:11.726Z
Link: CVE-2026-22613
Updated: 2026-02-09T16:10:42.568Z
Status : Awaiting Analysis
Published: 2026-02-09T06:16:24.360
Modified: 2026-02-09T16:08:35.290
Link: CVE-2026-22613
No data.
OpenCVE Enrichment
Updated: 2026-02-10T12:23:58Z