Cyber Posture

CVE-2025-22495

HighRCE

Published: 24 February 2025

Published
24 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0008 24.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22495 is a high-severity OS Command Injection (CWE-78) vulnerability in Eaton (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs to the NTP server configuration field, preventing command injection vulnerabilities like CWE-78.

prevent

Mandates timely flaw remediation through firmware patching to version 3.0.4, as specified in Eaton's security bulletin.

prevent

Prohibits use of end-of-life Network-M2 cards, requiring upgrade to supported Network-M3 to eliminate exposure to this unpatched vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection via improper input validation in NTP config field directly enables arbitrary command execution on the device OS, mapping to Unix Shell.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the…

more

version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.

Deeper analysisAI

CVE-2025-22495 is an improper input validation vulnerability (CWE-78) in the NTP server configuration field of the Eaton Network-M2 card, a network interface used for power management in UPS and related systems. This flaw allows an authenticated high-privileged user to execute arbitrary commands on the device. The vulnerability has been addressed in Network-M2 firmware version 3.0.4 and carries a CVSS v3.1 base score of 8.4 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).

Exploitation requires an attacker to have high privileges (PR:H) on the affected Network-M2 card, network access (AV:N), and the ability to trigger user interaction (UI:R), such as confirming a malicious input. Successful exploitation enables arbitrary command execution with high confidentiality, integrity, and availability impacts (C:I:A:H), and changes the scope (S:C) to potentially affect broader system components.

Eaton's security bulletin (etn-va-2025-1004.pdf) details the patch in firmware version 3.0.4 as the primary mitigation. Additionally, the Network-M2 card reached end-of-life in early 2024, with Network-M3 released as a direct functional replacement; organizations are advised to upgrade to supported hardware to avoid unpatched exposure.

No public reports of real-world exploitation are available as of the CVE publication on 2025-02-24.

Details

CWE(s)

Affected Products

Eaton
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-1460Shared CWE-78
CVE-2026-22227Shared CWE-78
CVE-2024-54018Shared CWE-78
CVE-2025-22606Shared CWE-78
CVE-2024-55590Shared CWE-78
CVE-2024-57019Shared CWE-78
CVE-2025-5965Shared CWE-78
CVE-2025-53949Shared CWE-78
CVE-2026-26280Shared CWE-78
CVE-2024-11253Shared CWE-78

References