Insecure Firmware Upgrade Mechanism in Eaton Network M3
CVE-2026-22613
5.7MEDIUM
What is CVE-2026-22613?
The Eaton Network M3 has an insecurely implemented server identity check mechanism for firmware upgrades via the command shell. This vulnerability could enable an attacker to intercept and manipulate firmware updates, potentially leading to unauthorized access and compromised system integrity. Eaton has addressed this issue in the latest firmware release, available for download to ensure users can secure their devices against such attacks.
Affected Version(s)
Network M3 0 < 2.3.3
