CVE-2026-22613 PUBLISHED

Assigner: Eaton
Reserved: 08.01.2026 Published: 09.02.2026 Updated: 09.02.2026

The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton

Network M3

which is available on the Eaton download center.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
CVSS Score: 5.7

Product Status

Vendor Eaton
Product Network M3
Versions Default: unaffected
  • affected from 0 to 2.3.3 (excl.)

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE