Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package
could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-67450",
"assignerOrgId": "63703b7d-23e2-41ef-94b3-a3c6333f7759",
"assignerShortName": "Eaton",
"dateUpdated": "2025-12-26T14:55:51.712Z",
"dateReserved": "2025-12-08T12:25:10.744Z",
"datePublished": "2025-12-26T06:59:41.375Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "63703b7d-23e2-41ef-94b3-a3c6333f7759",
"shortName": "Eaton",
"dateUpdated": "2025-12-26T06:59:41.375Z"
},
"datePublic": "2025-12-26T06:54:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package\n\n could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Due to insecure library loading in the Eaton UPS Companion software executable, <span style=\"background-color: rgb(255, 255, 255);\">an attacker with access to the software package</span>\n\n could perform arbitrary code execution . <span style=\"background-color: rgb(255, 255, 255);\">This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.</span>"
}
]
}
],
"affected": [
{
"vendor": "Eaton",
"product": "UPS Companion software",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "3.0"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-427 Uncontrolled Search Path Element",
"cweId": "CWE-427",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1027.pdf"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-26T14:55:51.712Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}