Medium severity6.0NVD Advisory· Published Apr 16, 2026· Updated Apr 22, 2026
CVE-2026-22615
CVE-2026-22615
Description
Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.
Affected products
1- cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*Range: <2.00
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.