Description
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.
Published: 2026-04-16
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Insecure cookie configuration permits man‑in‑the‑middle interception of credentials or privileged data.
Action: Patch ASAP
AI Analysis

Impact

Eaton Intelligent Power Protector software stores authentication information in cookies that lack secure attributes, making the cookie visible to traffic snoops. An attacker who can observe network traffic could intercept the cookie and use it to impersonate a legitimate user or execute operations on the device. This vulnerability directly jeopardizes confidentiality and authenticity of the device’s session data.

Affected Systems

The vulnerability affects Eaton Intelligent Power Protector (IPP) devices. The product details mention a publicly released patch that addresses the insecure cookie handling. No specific firmware or software versions are listed in the data, so all IPP installations are potentially susceptible until they apply the latest update.

Risk and Exploitability

The CVSS score of 5.7 indicates a moderate severity. There is no EPSS score provided, and the issue is not in the CISA KEV catalog, suggesting that documented exploitation is unknown at this time. Nevertheless, because the flaw relies on traffic interception, any network path that the attacker can access could be sufficient to replay the cookie, especially if HTTPS is not enforced. The attack vector is inferred to be network-based MITM. Organizations using IPP should assume the risk until the fix is applied.

Generated by OpenCVE AI on April 17, 2026 at 04:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Eaton IPP software update that resolves the insecure cookie configuration.
  • Configure the device to use HTTPS exclusively for management and monitoring traffic, ensuring cookies are transmitted over an encrypted channel.
  • Review access control and network segmentation to limit exposure of the IPP management interface to trusted hosts only.

Generated by OpenCVE AI on April 17, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Eaton intelligent Power Protector
CPEs cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*
Vendors & Products Eaton intelligent Power Protector

Fri, 17 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Title Insecure Cookie Configuration in Eaton IPP Allows Network-Based Man-in-the-Middle Interception

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Eaton
Eaton ipp Software
Vendors & Products Eaton
Eaton ipp Software

Thu, 16 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.
Weaknesses CWE-614
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Eaton Intelligent Power Protector Ipp Software
cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2026-04-16T13:23:29.510Z

Reserved: 2026-01-08T04:55:11.729Z

Link: CVE-2026-22617

cve-icon Vulnrichment

Updated: 2026-04-16T13:23:20.084Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-16T06:16:08.980

Modified: 2026-04-22T20:01:50.360

Link: CVE-2026-22617

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T05:00:05Z

Weaknesses