Default Credentials Vulnerability Affects IPP Software
CVE-2022-33862

6.7MEDIUM

Key Information:

Vendor
Eaton
Vendor
CVE Published:
25 November 2024

Summary

Eaton's IPP software prior to version 1.71 contains a vulnerability associated with default credentials, allowing potential attackers to identify and exploit vulnerable systems. This security flaw poses a significant risk as it enables unauthorized users to access the software without proper authentication, potentially leading to further exploitation and data breaches. Users are strongly advised to upgrade to the latest version to mitigate this vulnerability and enhance the security posture of their systems.

Affected Version(s)

Intelligent Power Protector (IPP) 0 < 1.71

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-33862 : Default Credentials Vulnerability Affects IPP Software | SecurityVulnerability.io