Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton intelligent Power Protector
|
|
| CPEs | cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eaton intelligent Power Protector
|
Fri, 17 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Cookie Configuration in Eaton IPP Allows Network-Based Man-in-the-Middle Interception |
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton ipp Software |
|
| Vendors & Products |
Eaton
Eaton ipp Software |
Thu, 16 Apr 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre. | |
| Weaknesses | CWE-614 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2026-04-16T13:23:29.510Z
Reserved: 2026-01-08T04:55:11.729Z
Link: CVE-2026-22617
Updated: 2026-04-16T13:23:20.084Z
Status : Analyzed
Published: 2026-04-16T06:16:08.980
Modified: 2026-04-22T20:01:50.360
Link: CVE-2026-22617
No data.
OpenCVE Enrichment
Updated: 2026-04-17T05:00:05Z