Dataprobe iBoot-PDU
Dataprobe iBoot-PDU firmware versions prior to 1.43.03312023 contain multiple critical vulnerabilities including command injection (CWE-78), path traversal (CWE-22), information disclosure (CWE-200), and improper access controls (CWE-284, CWE-863). These flaws allow an unauthenticated attacker with network access to execute arbitrary commands, read configuration and credential files, or manipulate power outlet states. The vulnerabilities stem from insufficient input validation and weak authentication mechanisms across web interfaces and SNMP functionality.
- Network access to the iBoot-PDU (HTTP, HTTPS, or SNMP ports)
- No authentication required to exploit most vulnerabilities
- Device must be running firmware version prior to 1.43.03312023
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4258a8c3-bdc1-4e49-aaa2-a11cf1504cf3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.