EUVD-2026-23178

| CVE-2026-22619 HIGH
2026-04-16 Eaton GHSA-w3cg-4gfc-vw5x
7.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Re-analysis Queued
Apr 16, 2026 - 06:37 vuln.today
cvss_changed
patch_available
Apr 16, 2026 - 06:01 EUVD
Analysis Generated
Apr 16, 2026 - 05:59 vuln.today

DescriptionNVD

Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download center.

AnalysisAI

Arbitrary code execution in Eaton Intelligent Power Protector (IPP) software via insecure library loading allows local authenticated attackers with low privileges to execute code with elevated integrity impact across security boundaries. Attack complexity is high, requiring the attacker to have access to the software package installation files. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all systems running Eaton IPP and document current installed versions; contact Eaton support to confirm patched version availability and compatibility. Within 7 days: Obtain and validate the patched version from Eaton's download center in a test environment; implement access controls restricting local login to IPP-hosting systems. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23178 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy