Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22618: CWE-358 Improperly implemented security check for standard in Eaton IPP software

0
Medium
VulnerabilityCVE-2026-22618cvecve-2026-22618cwe-358
Published: Thu Apr 16 2026 (04/16/2026, 05:11:06 UTC)
Source: CVE Database V5
Vendor/Project: Eaton
Product: IPP software

Description

CVE-2026-22618 is a medium severity vulnerability in Eaton Intelligent Power Protector (IPP) software caused by a security misconfiguration where an HTTP response header was set with an insecure attribute. This flaw could potentially expose users to web-based attacks. Eaton has fixed this issue in the latest version of the IPP software, which is available for download from their official site.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/16/2026, 06:02:59 UTC

Technical Analysis

This vulnerability (CWE-358) in Eaton IPP software involves an improperly implemented security check related to HTTP response headers. Specifically, an insecure attribute was set in an HTTP response header, which may allow attackers to exploit web-based attack vectors. The CVSS 3.1 base score is 5.9, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. Eaton has released a fixed version of the software to address this issue.

Potential Impact

The vulnerability could allow attackers to exploit the insecure HTTP response header attribute to perform web-based attacks that compromise confidentiality and integrity of the affected system. However, there are no known exploits in the wild at this time. The impact does not affect availability.

Mitigation Recommendations

A fix is available in the latest version of Eaton IPP software, which can be obtained from the Eaton download centre. Users should update to this fixed version to remediate the vulnerability. No additional mitigation guidance is provided or required beyond applying the official update.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Eaton
Date Reserved
2026-01-08T04:55:11.730Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69e077cc82d89c981f4f9233

Added to database: 4/16/2026, 5:46:52 AM

Last enriched: 4/16/2026, 6:02:59 AM

Last updated: 4/16/2026, 7:33:11 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses