Impact
The vulnerability arises from insecure library loading in the Eaton Intelligent Power Protector executable. This weakness allows an attacker who can supply or modify the software package to load arbitrary libraries, resulting in execution of malicious code. The primary consequence is full code execution on the affected system, potentially giving an attacker control over the device and compromising integrity and confidentiality.
Affected Systems
The affected product is Eaton Intelligent Power Protector (IPP). Specific version information is not disclosed in the advisory; the issue exists in earlier releases before the latest available update.
Risk and Exploitability
The CVSS score of 7.8 indicates a high level of severity. No EPSS score is provided, so the current probability of exploitation in the wild is unspecified. The vulnerability has not been reported in the CISA KEV catalog. The likely attack vector requires the attacker to have access to the software package or installation media, implying a local or supply‑chain scenario. Once the vulnerable library is loaded, the attacker can execute arbitrary code with the privileges of the IPP process.
OpenCVE Enrichment