"value":"Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code."
"value":"upgrade the software to latest version 1.69"
}
],
"source":{
"advisory":"ETN-VA-2021-1000",
"defect":[
"ETN-VA-2021-1000"
],
"discovery":"EXTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"To prevent the exploitation of the issues and safeguard the software from malicious entities, Eaton recommends blocking ports 4679 & 4680 at the enterprise network or home network where Intelligent Power Manager (IPM) software is installed and used"