eaton CVE Vulnerabilities & Metrics

Focus on eaton vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About eaton Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with eaton. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total eaton CVEs: 41
Earliest CVE date: 28 May 2009, 14:30 UTC
Latest CVE date: 13 Sep 2024, 17:15 UTC

Latest CVE reference: CVE-2024-31416

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical eaton CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.79

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 20
7.0-8.9 5
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS eaton CVEs

These are the five CVEs with the highest CVSS scores for eaton, sorted by severity first and recency.

All CVEs for eaton

CVE-2024-31416 eaton vulnerability CVSS: 0 13 Sep 2024, 17:15 UTC

The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.

CVE-2024-31415 eaton vulnerability CVSS: 0 13 Sep 2024, 17:15 UTC

The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration.

CVE-2024-31414 eaton vulnerability CVSS: 0 13 Sep 2024, 17:15 UTC

The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors.

CVE-2023-43777 eaton vulnerability CVSS: 0 17 Oct 2023, 13:15 UTC

Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries. 

CVE-2023-43776 eaton vulnerability CVSS: 0 17 Oct 2023, 13:15 UTC

Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending).

CVE-2023-43775 eaton vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore.

CVE-2022-33859 eaton vulnerability CVSS: 0 28 Oct 2022, 02:15 UTC

A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation’s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html .

CVE-2021-23283 eaton vulnerability CVSS: 3.5 19 Apr 2022, 21:15 UTC

Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.

CVE-2021-23284 eaton vulnerability CVSS: 3.5 18 Apr 2022, 17:15 UTC

Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to Stored Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.

CVE-2021-23288 eaton vulnerability CVSS: 2.3 01 Apr 2022, 23:15 UTC

The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.

CVE-2021-23287 eaton vulnerability CVSS: 3.5 01 Apr 2022, 23:15 UTC

The vulnerability exists due to insufficient validation of input of certain resources within the IPM software. This issue affects: Intelligent Power Manager (IPM 1) versions prior to 1.70.

CVE-2021-23281 eaton vulnerability CVSS: 7.5 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.

CVE-2021-23280 eaton vulnerability CVSS: 6.5 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.

CVE-2021-23279 eaton vulnerability CVSS: 6.4 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.

CVE-2021-23278 eaton vulnerability CVSS: 5.5 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.

CVE-2021-23277 eaton vulnerability CVSS: 7.5 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.

CVE-2021-23276 eaton vulnerability CVSS: 6.5 13 Apr 2021, 19:15 UTC

Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.

CVE-2020-6656 eaton vulnerability CVSS: 6.8 07 Jan 2021, 18:15 UTC

Eaton's easySoft software v7.xx prior to v7.22 are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion.

CVE-2020-6655 eaton vulnerability CVSS: 6.8 07 Jan 2021, 18:15 UTC

The Eaton's easySoft software v7.xx prior to v7.22 are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application.

CVE-2020-6654 eaton vulnerability CVSS: 4.4 30 Sep 2020, 21:15 UTC

A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.

CVE-2020-6653 eaton vulnerability CVSS: 2.1 12 Aug 2020, 17:15 UTC

Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.

CVE-2020-6652 eaton vulnerability CVSS: 4.6 07 May 2020, 16:15 UTC

Incorrect Privilege Assignment vulnerability in Eaton's Intelligent Power Manager (IPM) v1.67 & prior allow non-admin users to upload the system configuration files by sending specially crafted requests. This can result in non-admin users manipulating the system configurations via uploading the configurations with incorrect parameters.

CVE-2020-6651 eaton vulnerability CVSS: 6.0 07 May 2020, 16:15 UTC

Improper Input Validation in Eaton's Intelligent Power Manager (IPM) v 1.67 & prior on file name during configuration file import functionality allows attackers to perform command injection or code execution via specially crafted file names while uploading the configuration file in the application.

CVE-2020-10639 eaton vulnerability CVSS: 6.8 15 Apr 2020, 17:15 UTC

Eaton HMiSoft VU3 (HMIVU3 runtime not impacted), Version 3.00.23 and prior, however, the HMIVU runtimes are not impacted by these issues. A specially crafted input file could cause a buffer overflow when loaded by the affected product.

CVE-2020-10637 eaton vulnerability CVSS: 4.3 15 Apr 2020, 17:15 UTC

Eaton HMiSoft VU3 (HMIVU3 runtime not impacted), Version 3.00.23 and prior, however, the HMIVU runtimes are not impacted by these issues. A specially crafted input file could trigger an out-of-bounds read when loaded by the affected product.

CVE-2020-6650 eaton vulnerability CVSS: 5.8 23 Mar 2020, 14:15 UTC

UPS companion software v1.05 & Prior is affected by ‘Eval Injection’ vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed.

CVE-2020-7915 eaton vulnerability CVSS: 3.5 22 Jan 2020, 23:15 UTC

An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.

CVE-2019-5625 eaton vulnerability CVSS: 3.6 22 May 2019, 18:29 UTC

The Android mobile application Halo Home before 1.11.0 stores OAuth authentication and refresh access tokens in a clear text file. This file persists until the user logs out of the application and reboots the device. This vulnerability can allow an attacker to impersonate the legitimate user by reusing the stored OAuth token, thus allowing them to view and change the user's personal information stored in the backend cloud service. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

CVE-2018-9281 eaton vulnerability CVSS: 6.8 24 Oct 2018, 21:29 UTC

An issue was discovered on Eaton UPS 9PX 8000 SP devices. The administration panel is vulnerable to a CSRF attack on the change-password functionality. This vulnerability could be used to force a logged-in administrator to perform a silent password update. The affected forms are also vulnerable to Reflected Cross-Site Scripting vulnerabilities. This flaw could be triggered by driving an administrator logged into the Eaton application to a specially crafted web page. This attack could be done silently.

CVE-2018-9280 eaton vulnerability CVSS: 4.0 24 Oct 2018, 21:29 UTC

An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the SNMP version 3 user's password. The web page displayed by the appliance contains the password in cleartext. Passwords of the read and write users could be retrieved by browsing the source code of the webpage.

CVE-2018-9279 eaton vulnerability CVSS: 4.0 24 Oct 2018, 21:29 UTC

An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the user's password. The web page displayed by the appliance contains the password in cleartext. Passwords could be retrieved by browsing the source code of the webpage.

CVE-2018-16158 eaton vulnerability CVSS: 10.0 30 Aug 2018, 05:29 UTC

Eaton Power Xpert Meter 4000, 6000, and 8000 devices before 13.4.0.10 have a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins (to uid 0) via the PubkeyAuthentication option.

CVE-2018-8847 eaton vulnerability CVSS: 7.5 13 Jul 2018, 19:29 UTC

Eaton 9000X DriveA versions 2.0.29 and prior has a stack-based buffer overflow vulnerability, which may allow remote code execution.

CVE-2018-12031 eaton vulnerability CVSS: 7.5 07 Jun 2018, 16:29 UTC

Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.

CVE-2018-7511 eaton vulnerability CVSS: 6.8 20 Mar 2018, 16:29 UTC

In Eaton ELCSoft versions 2.04.02 and prior, there are multiple cases where specially crafted files could cause a buffer overflow which, in turn, may allow remote execution of arbitrary code.

CVE-2016-9368 eaton vulnerability CVSS: 5.0 14 Mar 2017, 09:59 UTC

An issue was discovered in Eaton xComfort Ethernet Communication Interface (ECI) Versions 1.07 and prior. By accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access files without authenticating.

CVE-2016-9357 eaton vulnerability CVSS: 5.0 13 Feb 2017, 21:59 UTC

An issue was discovered in certain legacy Eaton ePDUs -- the affected products are past end-of-life (EoL) and no longer supported: EAMxxx prior to June 30, 2015, EMAxxx prior to January 31, 2014, EAMAxx prior to January 31, 2014, EMAAxx prior to January 31, 2014, and ESWAxx prior to January 31, 2014. An unauthenticated attacker may be able to access configuration files with a specially crafted URL (Path Traversal).

CVE-2016-4512 eaton vulnerability CVSS: 7.5 03 Jul 2016, 14:59 UTC

Stack-based buffer overflow in ELCSimulator in Eaton ELCSoft 2.4.01 and earlier allows remote attackers to execute arbitrary code via a long packet.

CVE-2016-4509 eaton vulnerability CVSS: 6.0 03 Jul 2016, 14:59 UTC

Heap-based buffer overflow in elcsoft.exe in Eaton ELCSoft 2.4.01 and earlier allows remote authenticated users to execute arbitrary code via a crafted file.

CVE-2015-6471 eaton vulnerability CVSS: 4.3 23 Dec 2015, 03:59 UTC

Eaton Cooper Power Systems ProView 4.x and 5.x before 5.1 on Form 6 controls and Idea and IdeaPLUS relays does not properly initialize padding fields in Ethernet packets, which allows remote attackers to obtain sensitive information by reading packet data.

CVE-2014-9196 eaton vulnerability CVSS: 9.3 20 Jul 2015, 01:59 UTC

Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

CVE-2008-6816 eaton vulnerability CVSS: 10.0 28 May 2009, 14:30 UTC

Eaton MGEOPS Network Shutdown Module before 3.10 Build 13 allows remote attackers to execute arbitrary code by adding a custom action to the MGE frontend via pane_actionbutton.php, and then executing this action via exec_action.php.