Eaton Intelligent Power Manager
Eaton Intelligent Power Manager versions 1.67 and prior contain input validation (CWE-20) and permission enforcement (CWE-266) flaws that could allow command injection or code execution. A non-administrator user with network access to ports 4679 or 4680 could exploit these vulnerabilities to execute commands on the system or manipulate power management configurations. Eaton has released version 1.68 which addresses these issues. In the interim, blocking ports 4679 and 4680 at the firewall and isolating the system from the business network are recommended.
- Network access to ports 4679 or 4680 on the Intelligent Power Manager system
- Valid non-administrator user credentials for the Intelligent Power Manager application
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f8172aed-d7a5-40bc-8a3a-84aef9d16c71Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.