Eaton Intelligent Power Manager (IPM) prior to version 1.69 is vulnerable to an authenticated arbitrary file upload flaw, allowing attackers to execute malicious commands. Upgrade to version 1.69 for mitigation.
Eaton Intelligent Power Manager (IPM) prior to version 1.69 is vulnerable to an authenticated arbitrary file upload vulnerability. An attacker can exploit this vulnerability by uploading a malicious NodeJS file, potentially allowing for the execution of arbitrary commands.
Understanding CVE-2021-23280
This CVE identifies a security flaw in Eaton Intelligent Power Manager (IPM) software that can be exploited by authenticated attackers to upload malicious files and potentially compromise the system.
What is CVE-2021-23280?
Eaton Intelligent Power Manager (IPM) before version 1.69 is susceptible to an authenticated arbitrary file upload vulnerability. Attackers can upload a malicious NodeJS file using the 'uploadBackgroud' action in IPM's maps_srv.js.
The Impact of CVE-2021-23280
The vulnerability has a CVSS base score of 8.0, indicating a high severity issue. It affects confidentiality, integrity, and availability, making it critical for immediate remediation.
Technical Details of CVE-2021-23280
This section provides more in-depth technical insights into the vulnerability.
Vulnerability Description
IPM's maps_srv.js allows attackers to upload a malicious NodeJS file via the 'uploadBackground' action, enabling the execution of arbitrary code.
Affected Systems and Versions
Eaton Intelligent Power Manager (IPM) versions less than 1.69 are affected by this vulnerability.
Exploitation Mechanism
By sending a specially crafted packet, attackers can upload malicious code or execute arbitrary commands on the target system.
Mitigation and Prevention
To protect systems from CVE-2021-23280, immediate actions and long-term security measures are necessary.
Immediate Steps to Take
Upgrade the Eaton Intelligent Power Manager (IPM) software to the latest version 1.69 to mitigate the vulnerability.
Long-Term Security Practices
Block ports 4679 and 4680 at the network level where IPM software is deployed to prevent exploitation.
Patching and Updates
Regularly apply security patches and updates provided by Eaton to address known vulnerabilities.