The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton G4 PDU which is available on the Eaton download center.
References
Configurations
No configuration.
History
09 Feb 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| Summary | (en) The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton G4 PDU which is available on the Eaton download center. |
06 Aug 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-06 16:15
Updated : 2026-02-09 06:16
NVD link : CVE-2025-48393
Mitre link : CVE-2025-48393
CVE.ORG link : CVE-2025-48393
JSON object : View
Products Affected
No product.
CWE
CWE-295
Improper Certificate Validation
