CVE-2026-22615

medium

Description

Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.

References

https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf

Details

Source: Mitre, NVD

Published: 2026-04-16

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:H/Au:M/C:P/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 6

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H

Severity: Medium

EPSS

EPSS: 0.00027