CVE-2021-23281

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on Eaton Intelligent Power Manager (IPM) systems by sending specially crafted packets that exploit improper input sanitization. It affects IPM versions prior to 1.69, potentially compromising power management infrastructure. Attackers can force IPM to connect to malicious SNMP servers and execute their code.

💻 Affected Systems

Products:
  • Eaton Intelligent Power Manager (IPM)
Versions: All versions prior to 1.69
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of affected IPM installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, potentially gaining full control over the IPM system, disrupting power management operations, and using the system as a foothold for lateral movement.

🟠

Likely Case

Remote code execution leading to system compromise, data theft, or disruption of power management monitoring and control functions.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a CVSS score of 10.0, indicating high exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.69 or later

Vendor Advisory: https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-intelligent-power-manager-ipm-vulnerability-advisory.pdf

Restart Required: Yes

Instructions:

1. Download IPM version 1.69 or later from Eaton's official website. 2. Backup current configuration and data. 3. Run the installer to upgrade to the patched version. 4. Restart the IPM service or system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to IPM systems to only trusted management networks.

Firewall Rules

all

Block external access to IPM ports and restrict SNMP traffic to trusted sources only.

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check IPM version in the application interface or installation directory. Versions below 1.69 are vulnerable.

Check Version:

Check Help > About in IPM interface or examine installation properties

Verify Fix Applied:

Verify IPM version is 1.69 or higher after patching and test functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SNMP connection attempts
  • Unexpected process execution
  • CoverterCheckList action anomalies

Network Indicators:

  • Malformed packets to IPM ports
  • Unexpected outbound SNMP connections
  • Traffic to suspicious IP addresses

SIEM Query:

source="IPM" AND (event="coverterCheckList" OR protocol="SNMP" AND dest_ip NOT IN [trusted_ips])

🔗 References

📤 Share & Export