The following table lists the changes that have been made to the
CVE-2025-48393 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Aug. 06, 2025
Action Type Old Value New Value Added Description The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest version which is available on the Eaton download center. Added CVSS V3.1 AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L Added CWE CWE-295 Added Reference https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1002.pdf