The following table lists the changes that have been made to the
CVE-2025-22495 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Feb. 24, 2025
Action Type Old Value New Value Added Tag unsupported-when-assigned Added Description An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4.
Note – Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.Added CVSS V3.1 AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H Added CWE CWE-20 Added Reference https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1004.pdf Added Reference https://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-gigabit-network-card/Network-M2%20EOL.pdf