Unauthenticated Remote Code Execution in Eaton Intelligent Power Manager (IPM)

Unauthenticated Remote Code Execution in Eaton Intelligent Power Manager (IPM)

CVE-2021-23281 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.

Learn more about our Cis Benchmark Audit For Server Software.