CVE-2026-22615

MEDIUM

Eaton IPP Software <2.0 - Command Injection

Title source: llm
STIX 2.1

Description

Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.

Scores

CVSS v3 6.0
EPSS 0.0006
EPSS Percentile 17.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-20
Status published
Products (2)
eaton/intelligent_power_protector < 2.00
Eaton/IPP Software < 2.0
Published Apr 16, 2026
Tracked Since Apr 16, 2026