PT-2026-33256 · Eaton · Ipp
Published
2026-04-16
·
Updated
2026-04-16
·
CVE-2026-22615
CVSS v3.1
6.0
Medium
| AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H |
Due to improper
input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is
possible for an attacker with admin privileges and access to the local system to
inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Ipp