Insecure Server Identity Check Mechanism in Eaton Firmware Upgrade
CVE-2025-48393
5.7MEDIUM
What is CVE-2025-48393?
The server identity check mechanism for Eaton's firmware upgrades via command shell has been inadequately secured. This vulnerability poses a risk of Man-in-the-Middle attacks, enabling attackers to intercept or alter communications during firmware upgrades. Eaton has released an important update to address this issue, which can be downloaded from their official site.
Affected Version(s)
G4 PDU 0 < 3.5.0
References
CVSS V3.1
Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Harry Sintonen
