// For flags

CVE-2016-9357

 

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in certain legacy Eaton ePDUs -- the affected products are past end-of-life (EoL) and no longer supported: EAMxxx prior to June 30, 2015, EMAxxx prior to January 31, 2014, EAMAxx prior to January 31, 2014, EMAAxx prior to January 31, 2014, and ESWAxx prior to January 31, 2014. An unauthenticated attacker may be able to access configuration files with a specially crafted URL (Path Traversal).

Ha sido descubierto un problema en ciertas legacy Eaton ePDUs -- los productos afectados han pasado el término de vida útil (EoL) y ya no son compatibles: EAMxxx antes del 30 de junio de 2015, EMAxxx antes del 31 de enero de 2014, EAMAxx antes del 31 de enero , 2014, EMAAxx antes del 31 de enero de 2014 y ESWAxx antes del 31 de enero de 2014. Un atacante no autenticado puede tener acceso a los archivos de configuración con una URL especialmente manipulada (Salto de Ruta).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-11-16 CVE Reserved
  • 2017-02-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eaton
Search vendor "Eaton"
Eamxxx Series Epdu Firmware
Search vendor "Eaton" for product "Eamxxx Series Epdu Firmware"
<= 06-30-2015
Search vendor "Eaton" for product "Eamxxx Series Epdu Firmware" and version " <= 06-30-2015"
-
Affected
in Eaton
Search vendor "Eaton"
Eamxxx Series Epdu
Search vendor "Eaton" for product "Eamxxx Series Epdu"
--
Safe
Eaton
Search vendor "Eaton"
Emaxxx Series Epdu Firmware
Search vendor "Eaton" for product "Emaxxx Series Epdu Firmware"
<= 01-31-2014
Search vendor "Eaton" for product "Emaxxx Series Epdu Firmware" and version " <= 01-31-2014"
-
Affected
in Eaton
Search vendor "Eaton"
Emaxxx Series Epdu
Search vendor "Eaton" for product "Emaxxx Series Epdu"
--
Safe
Eaton
Search vendor "Eaton"
Eamaxx Series Epdu Firmware
Search vendor "Eaton" for product "Eamaxx Series Epdu Firmware"
<= 01-31-2014
Search vendor "Eaton" for product "Eamaxx Series Epdu Firmware" and version " <= 01-31-2014"
-
Affected
in Eaton
Search vendor "Eaton"
Eamaxx Series Epdu
Search vendor "Eaton" for product "Eamaxx Series Epdu"
--
Safe
Eaton
Search vendor "Eaton"
Emaaxx Series Epdu Firmware
Search vendor "Eaton" for product "Emaaxx Series Epdu Firmware"
<= 01-31-2014
Search vendor "Eaton" for product "Emaaxx Series Epdu Firmware" and version " <= 01-31-2014"
-
Affected
in Eaton
Search vendor "Eaton"
Emaaxx Series Epdu
Search vendor "Eaton" for product "Emaaxx Series Epdu"
--
Safe
Eaton
Search vendor "Eaton"
Eswaxx Series Epdu Firmware
Search vendor "Eaton" for product "Eswaxx Series Epdu Firmware"
<= 01-31-2014
Search vendor "Eaton" for product "Eswaxx Series Epdu Firmware" and version " <= 01-31-2014"
-
Affected
in Eaton
Search vendor "Eaton"
Eswaxx Series Epdu
Search vendor "Eaton" for product "Eswaxx Series Epdu"
--
Safe