The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest version which is available on the Eaton download center.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton g4 Pdu |
|
| Vendors & Products |
Eaton
Eaton g4 Pdu |
Wed, 06 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest version which is available on the Eaton download center. | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Eaton
Published: 2025-08-06T15:25:17.947Z
Updated: 2025-08-06T15:52:52.971Z
Reserved: 2025-05-20T04:07:25.100Z
Link: CVE-2025-48393
Updated: 2025-08-06T15:52:05.020Z
Status : Awaiting Analysis
Published: 2025-08-06T16:15:29.537
Modified: 2025-08-06T20:23:37.600
Link: CVE-2025-48393
No data.