Improper Input Validation in Network-M2 Card by Eaton
CVE-2025-22495
8.4HIGH
Key Information:
- Vendor
- Eaton
- Status
- Network M2
- Vendor
- CVE Published:
- 24 February 2025
Summary
An improper input validation flaw was identified in the configuration field of Eaton's Network-M2 card, which allows authenticated high privileged users to execute arbitrary commands. This vulnerability poses significant security risks, especially in systems relying on the Network-M2 card, which is now end-of-life as of early 2024. Users are encouraged to upgrade to the Network-M3 model, which serves as a robust replacement for the vulnerable product.
Affected Version(s)
Network M2 0 < 3.0.4
References
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved