CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
AI Analysis
Technical Summary
CVE-2025-67450 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Eaton's UPS Companion software. The root cause is insecure library loading within the software executable, which allows an attacker with local access to influence the search path for dynamic libraries. By placing a malicious library in a location that the software searches before the legitimate one, an attacker can cause the software to load and execute arbitrary code. This form of attack requires the attacker to have at least low-level privileges on the system but does not require user interaction, making it a potent vector for privilege escalation or persistence. The vulnerability affects all versions prior to the patched release, which Eaton has made available on their official download center. The CVSS v3.1 score of 7.8 reflects a high severity due to the combined impact on confidentiality, integrity, and availability, and the scope being changed (S:C) indicating potential compromise beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where UPS Companion software is used to manage critical power infrastructure. The vulnerability could be leveraged to disrupt power management, cause operational downtime, or facilitate further network intrusion.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity and security, especially for those relying on Eaton UPS systems for critical infrastructure such as data centers, hospitals, manufacturing plants, and financial institutions. Successful exploitation could lead to arbitrary code execution with elevated privileges, enabling attackers to disrupt power management, cause system outages, or move laterally within networks. The compromise of UPS management software could also undermine trust in power availability and potentially lead to cascading failures in dependent systems. Given the high integration of Eaton UPS products in European enterprise and industrial sectors, the impact could be widespread, affecting both private and public sector organizations. Additionally, the vulnerability could be exploited as part of a targeted attack against critical infrastructure, increasing the risk of economic and safety consequences.
Mitigation Recommendations
European organizations should immediately verify if Eaton UPS Companion software is deployed within their environments and identify affected versions. The primary mitigation is to upgrade to the latest patched version available from Eaton's official download center. Until patching is complete, organizations should restrict local access to systems running the vulnerable software, enforce strict access controls, and monitor for unusual library loading behavior or unauthorized file placements in directories searched by the software. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Network segmentation should be used to isolate critical UPS management systems from general user networks to reduce the risk of local exploitation. Additionally, organizations should review and harden endpoint security policies to prevent privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Description
Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
AI-Powered Analysis
Technical Analysis
CVE-2025-67450 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Eaton's UPS Companion software. The root cause is insecure library loading within the software executable, which allows an attacker with local access to influence the search path for dynamic libraries. By placing a malicious library in a location that the software searches before the legitimate one, an attacker can cause the software to load and execute arbitrary code. This form of attack requires the attacker to have at least low-level privileges on the system but does not require user interaction, making it a potent vector for privilege escalation or persistence. The vulnerability affects all versions prior to the patched release, which Eaton has made available on their official download center. The CVSS v3.1 score of 7.8 reflects a high severity due to the combined impact on confidentiality, integrity, and availability, and the scope being changed (S:C) indicating potential compromise beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where UPS Companion software is used to manage critical power infrastructure. The vulnerability could be leveraged to disrupt power management, cause operational downtime, or facilitate further network intrusion.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity and security, especially for those relying on Eaton UPS systems for critical infrastructure such as data centers, hospitals, manufacturing plants, and financial institutions. Successful exploitation could lead to arbitrary code execution with elevated privileges, enabling attackers to disrupt power management, cause system outages, or move laterally within networks. The compromise of UPS management software could also undermine trust in power availability and potentially lead to cascading failures in dependent systems. Given the high integration of Eaton UPS products in European enterprise and industrial sectors, the impact could be widespread, affecting both private and public sector organizations. Additionally, the vulnerability could be exploited as part of a targeted attack against critical infrastructure, increasing the risk of economic and safety consequences.
Mitigation Recommendations
European organizations should immediately verify if Eaton UPS Companion software is deployed within their environments and identify affected versions. The primary mitigation is to upgrade to the latest patched version available from Eaton's official download center. Until patching is complete, organizations should restrict local access to systems running the vulnerable software, enforce strict access controls, and monitor for unusual library loading behavior or unauthorized file placements in directories searched by the software. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Network segmentation should be used to isolate critical UPS management systems from general user networks to reduce the risk of local exploitation. Additionally, organizations should review and harden endpoint security policies to prevent privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Eaton
- Date Reserved
- 2025-12-08T12:25:10.744Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694e3453f3b146189c0afb82
Added to database: 12/26/2025, 7:08:03 AM
Last enriched: 12/26/2025, 7:23:17 AM
Last updated: 12/26/2025, 9:25:31 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59888: CWE-428 Unquoted Search Path or Element in Eaton UPS Companion software
MediumCVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
HighCVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE
HighCVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
MediumCVE-2025-52601: CWE-321: Use of Hard-coded Cryptographic Key in Hanwha Vision Co., Ltd. Device Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.