Privilege Escalation in NMC G2 by Eaton
CVE-2025-48395

4.7MEDIUM

Key Information:

Vendor

Eaton

Status
Vendor
CVE Published:
5 September 2025

What is CVE-2025-48395?

An authenticated attacker with privileged access could exploit a path traversal vulnerability in the NMC G2, enabling them to alter the contents of a non-sensitive file. This vulnerability arises from inadequate input validation within the command-line interface (CLI), allowing attackers to manipulate file paths and gain unauthorized access to files. The issue has since been addressed in the latest version available on the Eaton download center.

Affected Version(s)

NMC G2 0 < 2.2.0

References

CVSS V3.1

Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-48395 : Privilege Escalation in NMC G2 by Eaton