CVE-2026-22613

The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton Network M3 which is available on the Eaton download center.
Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) El mecanismo de verificación de identidad del servidor para la actualización del firmware realizada a través del shell de comandos está implementado de forma insegura, lo que podría permitir a un atacante realizar un ataque man-in-the-middle. Este problema de seguridad ha sido solucionado en la última versión del firmware de Eaton Network M3, que está disponible en el centro de descargas de Eaton.

09 Feb 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 06:16

Updated : 2026-04-15 00:35


NVD link : CVE-2026-22613

Mitre link : CVE-2026-22613

CVE.ORG link : CVE-2026-22613


JSON object : View

Products Affected

No product.

CWE
CWE-295

Improper Certificate Validation