CVE-2025-59888
Unknown Unknown - Not Provided
Improper Quotation in Eaton UPS Installer Enables Code Execution

Publication date: 2025-12-26

Last updated on: 2026-02-18

Assigner: Eaton

Description
Improper quotation in search paths in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the file system. This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-26
Last Modified
2026-02-18
Generated
2026-05-06
AI Q&A
2025-12-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eaton ups_companion to 3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability can lead to arbitrary code execution by an attacker with file system access, potentially resulting in full compromise of confidentiality, integrity, and availability of the affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Eaton UPS Companion software to the latest version available on the Eaton download center where the issue has been fixed.


Can you explain this vulnerability to me?

This vulnerability is caused by improper quotation in search paths within the Eaton UPS Companion software installer. This flaw could allow an attacker who has access to the file system to execute arbitrary code on the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart