CVE-2026-22619

Eaton · Intelligent Power Protector (IPP)

Eaton Intelligent Power Protector (IPP) is vulnerable to insecure library loading, which could allow an attacker with local access to achieve arbitrary code execution.

Executive summary

An insecure library loading vulnerability in Eaton’s Intelligent Power Protector (IPP) could allow attackers to execute arbitrary code with elevated privileges.

Vulnerability

The application executable is susceptible to insecure library loading, where the software may load malicious DLLs or shared libraries from an untrusted location. This allows an attacker with existing access to the software package to execute code in the context of the application.

Business impact

With a CVSS score of 7.8, this vulnerability is significant, particularly in environments managing critical power infrastructure. Successful exploitation could lead to full control over the IPP software, potentially allowing an attacker to manipulate power management settings or disrupt critical hardware operations.

Remediation

Immediate Action: Apply the vendor's security update as soon as it becomes available and ensure that the installation directory permissions are hardened.

Proactive Monitoring: Monitor the application environment for unexpected file creation or library loading events.

Compensating Controls: Restrict file system write access to the application’s installation directory to prevent unauthorized library placement.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Eaton customers should prioritize checking for vendor-provided updates. Given the potential for code execution on critical power management infrastructure, hardening the installation environment and applying patches is essential to prevent unauthorized system manipulation.