CVE-2026-22617
Published: 16 April 2026
Summary
CVE-2026-22617 is a medium-severity Sensitive Cookie in HTTPS Session Without 'Secure' Attribute (CWE-614) vulnerability in Eaton Intelligent Power Protector. Its CVSS base score is 5.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Steal Web Session Cookie (T1539); ranked at the 0.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SC-8 (Transmission Confidentiality and Integrity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the insecure cookie configuration flaw by requiring timely remediation through updates to the fixed version of Eaton IPP software.
Prevents man-in-the-middle interception of cookies by enforcing confidentiality and integrity protections for transmitted information over networks.
Ensures secure cookie configurations, such as Secure, HttpOnly, and SameSite attributes, to address the CWE-614 insecure cookie vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insecure cookie configuration (CWE-614) directly enables cookie interception via MITM, facilitating web session cookie theft (T1539) and adversary-in-the-middle attacks (T1557).
NVD Description
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest version of Eaton IPP…
more
software which is available on the Eaton download centre.
Deeper analysisAI
CVE-2026-22617 affects Eaton Intelligent Power Protector (IPP) software due to an insecure cookie configuration. This flaw, classified under CWE-614, enables potential interception of cookies by attackers, as rated with a CVSS v3.1 base score of 5.7 (AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N).
A network-based attacker with high privileges could exploit this vulnerability through a man-in-the-middle (MITM) attack, requiring high attack complexity and user interaction. Successful exploitation would grant high-impact confidentiality and integrity violations, such as unauthorized access to sensitive session data, but no availability disruption.
Eaton's security bulletin (ETN-VA-2025-1025) confirms the issue has been addressed in the latest version of IPP software, available via the Eaton download center; practitioners should update affected systems promptly to mitigate risks.
Details
- CWE(s)