Remote Code execution
CVE-2021-23281

10CRITICAL

Key Information:

Vendor
Eaton
Vendor
CVE Published:
13 April 2021

Summary

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.

Affected Version(s)

Intelligent Power manager (IPM) < 1.69

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Amir Preminger from Claroty research
.
CVE-2021-23281 : Remote Code execution | SecurityVulnerability.io