Eaton Intelligent Power Manager (IPM) < 1.69 Multiple Vulnerabilities (ETN-VA-2021-1000)

critical Nessus Plugin ID 149062

Synopsis

A web application development suite installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The version of Eaton Intelligent Power Manager installed on the remote Windows host is prior to 1.69. It is, therefore, affected multiple vulnerabilities:
- Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed (CVE-2021-23279).

- Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability (CVE-2021-23280).

- Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code (CVE-2021-23281). Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Eaton IPM version 1.69 or later.

See Also

http://www.nessus.org/u?23783677

Plugin Details

Severity: Critical

ID: 149062

File Name: eaton_ipm_ETN-VA-2021-1000.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 4/29/2021

Updated: 5/3/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-23281

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:eaton:intelligent_power_manager

Required KB Items: SMB/Registry/Enumerated, installed_sw/Eaton Intelligent Power Manager

Exploit Ease: No known exploits are available

Patch Publication Date: 4/12/2021

Vulnerability Publication Date: 4/12/2021

Reference Information

CVE: CVE-2021-23276, CVE-2021-23277, CVE-2021-23278, CVE-2021-23279, CVE-2021-23280, CVE-2021-23281

IAVA: 2021-A-0203