CVE-2026-22619
Eaton · Intelligent Power Protector (IPP)
Eaton Intelligent Power Protector (IPP) is vulnerable to insecure library loading, which could allow an attacker with local access to achieve arbitrary code execution.
Executive summary
An insecure library loading vulnerability in Eaton’s Intelligent Power Protector (IPP) could allow attackers to execute arbitrary code with elevated privileges.
Vulnerability
The application executable is susceptible to insecure library loading, where the software may load malicious DLLs or shared libraries from an untrusted location. This allows an attacker with existing access to the software package to execute code in the context of the application.
Business impact
With a CVSS score of 7.8, this vulnerability is significant, particularly in environments managing critical power infrastructure. Successful exploitation could lead to full control over the IPP software, potentially allowing an attacker to manipulate power management settings or disrupt critical hardware operations.
Remediation
Immediate Action: Apply the vendor's security update as soon as it becomes available and ensure that the installation directory permissions are hardened.
Proactive Monitoring: Monitor the application environment for unexpected file creation or library loading events.
Compensating Controls: Restrict file system write access to the application’s installation directory to prevent unauthorized library placement.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Eaton customers should prioritize checking for vendor-provided updates. Given the potential for code execution on critical power management infrastructure, hardening the installation environment and applying patches is essential to prevent unauthorized system manipulation.