Insecure Server Identity Check Mechanism in Eaton Firmware Upgrade
CVE-2025-48393

5.7MEDIUM

Key Information:

Vendor

Eaton

Status
Vendor
CVE Published:
6 August 2025

What is CVE-2025-48393?

The server identity check mechanism for Eaton's firmware upgrades via command shell has been inadequately secured. This vulnerability poses a risk of Man-in-the-Middle attacks, enabling attackers to intercept or alter communications during firmware upgrades. Eaton has released an important update to address this issue, which can be downloaded from their official site.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

G4 PDU 0 < 3.5.0

References

CVSS V3.1

Score:
5.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Harry Sintonen
.