{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22618","assignerOrgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","state":"PUBLISHED","assignerShortName":"Eaton","dateReserved":"2026-01-08T04:55:11.730Z","datePublished":"2026-04-16T05:11:06.548Z","dateUpdated":"2026-04-16T13:10:01.651Z"},"containers":{"cna":{"providerMetadata":{"orgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","shortName":"Eaton","dateUpdated":"2026-04-16T05:11:06.548Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-358","description":"CWE-358 Improperly implemented security check for standard","type":"CWE"}]}],"affected":[{"vendor":"Eaton","product":"IPP software","versions":[{"status":"affected","version":"0","lessThan":"2.0","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTTP response header was set with an insecure attribute, potentially exposing users to web‑based attacks. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.","supportingMedia":[{"type":"text/html","base64":false,"value":"<div>A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTTP response header was set with an insecure attribute, potentially exposing users to web‑based attacks.&nbsp;<span>This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.</span></div>"}]}],"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1025.pdf"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.9,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-16T13:08:42.475365Z","id":"CVE-2026-22618","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-16T13:10:01.651Z"}}]}}