Show filters
49 Total Results
Displaying 1-10 of 49
Sort by:
Attacker Value
Unknown

CVE-2022-33862

Disclosure Date: November 25, 2024 (last updated January 05, 2025)
IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems.
0
Attacker Value
Unknown

CVE-2022-33861

Disclosure Date: November 25, 2024 (last updated January 05, 2025)
IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a way that causes it to accept invalid data.
0
Attacker Value
Unknown

CVE-2021-23282

Disclosure Date: November 25, 2024 (last updated January 05, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The vulnerability exists due to insufficient validation of input from certain resources by the IPM software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system
0
Attacker Value
Unknown

CVE-2024-31416

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.
Attacker Value
Unknown

CVE-2024-31415

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration.
Attacker Value
Unknown

CVE-2024-31414

Disclosure Date: September 13, 2024 (last updated September 20, 2024)
The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors.
Attacker Value
Unknown

CVE-2023-43777

Disclosure Date: October 17, 2023 (last updated October 26, 2023)
Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries. 
Attacker Value
Unknown

CVE-2023-43776

Disclosure Date: October 17, 2023 (last updated October 26, 2023)
Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).
Attacker Value
Unknown

CVE-2023-43775

Disclosure Date: September 27, 2023 (last updated October 08, 2023)
Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore.
Attacker Value
Unknown

CVE-2022-33859

Disclosure Date: October 28, 2022 (last updated October 18, 2023)
A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation’s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html .