Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Network M3

Source -

CNA

CNA CVEs -

1

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
1Vulnerabilities found

CVE-2026-22613
Assigner-Eaton
ShareView Details
Assigner-Eaton
CVSS Score-5.7||MEDIUM
EPSS-0.03% / 8.45%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 05:39
Updated-09 Feb, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. This security issue has been fixed in the latest firmware version of Eaton Network M3 which is available on the Eaton download center.

Action-Not Available
Vendor-Eaton
Product-Network M3
CWE ID-CWE-295
Improper Certificate Validation