Insecure Server Identity Check Mechanism in Eaton Firmware Upgrade
CVE-2025-48393

5.7MEDIUM

Key Information:

Vendor

Eaton

Status
Vendor
CVE Published:
6 August 2025

What is CVE-2025-48393?

The server identity check mechanism for Eaton's firmware upgrades via command shell has been inadequately secured. This vulnerability poses a risk of Man-in-the-Middle attacks, enabling attackers to intercept or alter communications during firmware upgrades. Eaton has released an important update to address this issue, which can be downloaded from their official site.

Affected Version(s)

G4 PDU 0 < 3.5.0

References

CVSS V3.1

Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Harry Sintonen
.
CVE-2025-48393 : Insecure Server Identity Check Mechanism in Eaton Firmware Upgrade