The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton
Network M3
which is available on the Eaton download center.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton Network M3 which is available on the Eaton download center. | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2026-02-09T05:39:22.834Z
Reserved: 2026-01-08T04:55:11.726Z
Link: CVE-2026-22613
No data.
Status : Received
Published: 2026-02-09T06:16:24.360
Modified: 2026-02-09T06:16:24.360
Link: CVE-2026-22613
No data.
OpenCVE Enrichment
No data.