CVE-2021-23281
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
13/04/2021
Last modified:
20/04/2021
Description
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:eaton:intelligent_power_manager:*:*:*:*:*:*:*:* | 1.69 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



