Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download center.
References
| Link | Resource |
|---|---|
| https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf | Vendor Advisory |
Configurations
History
22 Apr 2026, 20:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf - Vendor Advisory | |
| CPE | cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:* | |
| First Time |
Eaton
Eaton intelligent Power Protector |
16 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-427 |
16 Apr 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-16 06:16
Updated : 2026-04-22 20:00
NVD link : CVE-2026-22619
Mitre link : CVE-2026-22619
CVE.ORG link : CVE-2026-22619
JSON object : View
Products Affected
eaton
- intelligent_power_protector
CWE
CWE-427
Uncontrolled Search Path Element
