CVE-2026-22619

Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download center.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*

History

22 Apr 2026, 20:00

Type Values Removed Values Added
References () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf - () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf - Vendor Advisory
CPE cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*
First Time Eaton
Eaton intelligent Power Protector

16 Apr 2026, 13:16

Type Values Removed Values Added
CWE CWE-427

16 Apr 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-16 06:16

Updated : 2026-04-22 20:00


NVD link : CVE-2026-22619

Mitre link : CVE-2026-22619

CVE.ORG link : CVE-2026-22619


JSON object : View

Products Affected

eaton

  • intelligent_power_protector
CWE
CWE-427

Uncontrolled Search Path Element