Privilege Escalation in NMC G2 by Eaton
CVE-2025-48395
4.7MEDIUM
What is CVE-2025-48395?
An authenticated attacker with privileged access could exploit a path traversal vulnerability in the NMC G2, enabling them to alter the contents of a non-sensitive file. This vulnerability arises from inadequate input validation within the command-line interface (CLI), allowing attackers to manipulate file paths and gain unauthorized access to files. The issue has since been addressed in the latest version available on the Eaton download center.
Affected Version(s)
NMC G2 0 < 2.2.0
References
CVSS V3.1
Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
