CVE-2025-22495 – “Network-M2 NTP Server Configuration Command Injection Vulnerability”

The following table lists the changes that have been made to the
CVE-2025-22495 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 24, 2025

    Action Type Old Value New Value
    Added Tag unsupported-when-assigned
    Added Description An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4.
    Note – Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
    Added CWE CWE-20
    Added Reference https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1004.pdf
    Added Reference https://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-gigabit-network-card/Network-M2%20EOL.pdf
Share the Post:

Related Posts