CVE-2025-22495
Published: 24 February 2025
Summary
CVE-2025-22495 is a high-severity OS Command Injection (CWE-78) vulnerability in Eaton (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of inputs to the NTP server configuration field, preventing command injection vulnerabilities like CWE-78.
Mandates timely flaw remediation through firmware patching to version 3.0.4, as specified in Eaton's security bulletin.
Prohibits use of end-of-life Network-M2 cards, requiring upgrade to supported Network-M3 to eliminate exposure to this unpatched vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection via improper input validation in NTP config field directly enables arbitrary command execution on the device OS, mapping to Unix Shell.
NVD Description
An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the…
more
version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Deeper analysisAI
CVE-2025-22495 is an improper input validation vulnerability (CWE-78) in the NTP server configuration field of the Eaton Network-M2 card, a network interface used for power management in UPS and related systems. This flaw allows an authenticated high-privileged user to execute arbitrary commands on the device. The vulnerability has been addressed in Network-M2 firmware version 3.0.4 and carries a CVSS v3.1 base score of 8.4 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).
Exploitation requires an attacker to have high privileges (PR:H) on the affected Network-M2 card, network access (AV:N), and the ability to trigger user interaction (UI:R), such as confirming a malicious input. Successful exploitation enables arbitrary command execution with high confidentiality, integrity, and availability impacts (C:I:A:H), and changes the scope (S:C) to potentially affect broader system components.
Eaton's security bulletin (etn-va-2025-1004.pdf) details the patch in firmware version 3.0.4 as the primary mitigation. Additionally, the Network-M2 card reached end-of-life in early 2024, with Network-M3 released as a direct functional replacement; organizations are advised to upgrade to supported hardware to avoid unpatched exposure.
No public reports of real-world exploitation are available as of the CVE publication on 2025-02-24.
Details
- CWE(s)