PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9357 Eaton CVE debrief

CVE-2016-9357 affects legacy Eaton ePDUs that were already past end-of-life when the issue was disclosed. The vulnerability is a path traversal flaw that may allow an unauthenticated attacker to access configuration files through a specially crafted URL. NVD rates the issue as medium severity, with network access required but no privileges or user interaction needed. Because the impacted products are no longer supported, remediation is likely to center on isolation, access restriction, and replacement rather than vendor patching.

Vendor
Eaton
Product
CVE-2016-9357
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Organizations that still operate Eaton ePDUs from the affected legacy families: EAMxxx, EMAxxx, EAMAxx, EMAAxx, and ESWAxx. This is especially relevant for industrial, facilities, and data-center teams that may have forgotten these devices on management networks or left them reachable from broader internal segments.

Technical summary

The NVD entry classifies the weakness as CWE-22 (path traversal) and lists CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The affected firmware ranges identified in the NVD data are EAMxxx prior to 06-30-2015, EMAxxx prior to 01-31-2014, EAMAxx prior to 01-31-2014, EMAAxx prior to 01-31-2014, and ESWAxx prior to 01-31-2014. The supplied description indicates the attacker may be able to access configuration files using a specially crafted URL.

Defensive priority

Medium. The confidentiality impact is limited, but the exposure is unauthenticated and network-reachable, and the affected devices are end-of-life. If any of these ePDUs remain deployed, they should be treated as legacy-risk assets and handled promptly.

Recommended defensive actions

  • Inventory Eaton ePDUs and confirm whether any EAMxxx, EMAxxx, EAMAxx, EMAAxx, or ESWAxx devices are still in service.
  • Remove any public exposure and restrict management access to tightly controlled administrative networks only.
  • Segment legacy ePDUs so they are not reachable from general user networks or untrusted segments.
  • If affected devices are still required, pursue replacement planning because the affected product lines are past end-of-life and no longer supported.
  • Review whether configuration files or management interfaces are exposed in ways that would make path traversal attempts feasible, and tighten local access controls accordingly.
  • Use the vendor and US-CERT references to confirm current mitigation guidance for your deployment environment.

Evidence notes

All factual statements are drawn from the supplied NVD record and listed references. The record states the issue is a path traversal vulnerability that may permit unauthenticated access to configuration files, and it identifies the affected Eaton ePDU legacy product families and their end-of-life status. The supplied NVD metadata also provides the CVSS 3.0 vector and CWE-22 classification. No exploit details or unsupported remediation claims are included.

Official resources

Publicly disclosed on 2017-02-13, based on the supplied CVE published date. The supplied record does not provide a separate issue-discovery date.