#VU63035 Improper Neutralization of Formula Elements in a CSV File in Intelligent Power Manager Infrastructure


Published: 2022-05-11

Vulnerability identifier: #VU63035

Vulnerability risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23286

CWE-ID: CWE-1236

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Intelligent Power Manager Infrastructure
Client/Desktop applications / Software for system administration

Vendor: Eaton

Description

The vulnerability allows a remote user to compromsie the target system.

The vulnerability exists due to improper neutralization of formula elements in a CSV File. An administrator on the local network can inject formulas into the tag data.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Intelligent Power Manager Infrastructure: 1.5.0 plus205


External links
http://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Intelligent-Power-Manager-(IPM)-Infrastructure-Vulnerability-Advisory_1001c_V1.0.pdf
http://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-intelligent-power-manager/software/ipm-understand-edition-emea/eaton-ipminfra-eolmemo-en-us.pdf.


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability