CVE-2025-59887
Unknown Unknown - Not Provided
Improper Authentication in Eaton UPS Installer Enables Code Execution

Publication date: 2025-12-26

Last updated on: 2026-02-18

Assigner: Eaton

Description
Improper authentication of library files in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the software package. This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-26
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2025-12-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eaton ups_companion to 3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves improper authentication of library files in the Eaton UPS Companion software installer. An attacker who has access to the software package could exploit this flaw to execute arbitrary code on the system during installation.


How can this vulnerability impact me? :

The vulnerability can lead to arbitrary code execution by an attacker, potentially allowing them to take control of the affected system, compromise data integrity, confidentiality, and availability, and cause significant damage or disruption.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Eaton UPS Companion software to the latest version available on the Eaton download center, as the issue has been fixed in that release.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart