The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest version which is available on the Eaton download center.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Eaton
Eaton g4 Pdu |
|
Vendors & Products |
Eaton
Eaton g4 Pdu |
Wed, 06 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest version which is available on the Eaton download center. | |
Weaknesses | CWE-295 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Eaton
Published: 2025-08-06T15:25:17.947Z
Updated: 2025-08-06T15:52:52.971Z
Reserved: 2025-05-20T04:07:25.100Z
Link: CVE-2025-48393

Updated: 2025-08-06T15:52:05.020Z

Status : Awaiting Analysis
Published: 2025-08-06T16:15:29.537
Modified: 2025-08-06T20:23:37.600
Link: CVE-2025-48393

No data.