Description

Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.

INFO

Published Date :

2026-04-16T04:45:58.055Z

Last Modified :

2026-04-16T12:59:58.829Z

Source :

Eaton
AFFECTED PRODUCTS

The following products are affected by CVE-2026-22615 vulnerability.

Vendors Products
Eaton
  • Ipp Software
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22615.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact