CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
AI Analysis
Technical Summary
CVE-2025-67450 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Eaton's UPS Companion software. The root cause is insecure library loading within the software executable, which allows an attacker with local access to influence the search path for dynamic libraries. By placing a malicious library in a location that the software searches before the legitimate one, an attacker can cause the software to load and execute arbitrary code. This form of attack requires the attacker to have at least low-level privileges on the system but does not require user interaction, making it a potent vector for privilege escalation or persistence. The vulnerability affects all versions prior to the patched release, which Eaton has made available on their official download center. The CVSS v3.1 score of 7.8 reflects a high severity due to the combined impact on confidentiality, integrity, and availability, and the scope being changed (S:C) indicating potential compromise beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where UPS Companion software is used to manage critical power infrastructure. The vulnerability could be leveraged to disrupt power management, cause operational downtime, or facilitate further network intrusion.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity and security, especially for those relying on Eaton UPS systems for critical infrastructure such as data centers, hospitals, manufacturing plants, and financial institutions. Successful exploitation could lead to arbitrary code execution with elevated privileges, enabling attackers to disrupt power management, cause system outages, or move laterally within networks. The compromise of UPS management software could also undermine trust in power availability and potentially lead to cascading failures in dependent systems. Given the high integration of Eaton UPS products in European enterprise and industrial sectors, the impact could be widespread, affecting both private and public sector organizations. Additionally, the vulnerability could be exploited as part of a targeted attack against critical infrastructure, increasing the risk of economic and safety consequences.
Mitigation Recommendations
European organizations should immediately verify if Eaton UPS Companion software is deployed within their environments and identify affected versions. The primary mitigation is to upgrade to the latest patched version available from Eaton's official download center. Until patching is complete, organizations should restrict local access to systems running the vulnerable software, enforce strict access controls, and monitor for unusual library loading behavior or unauthorized file placements in directories searched by the software. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Network segmentation should be used to isolate critical UPS management systems from general user networks to reduce the risk of local exploitation. Additionally, organizations should review and harden endpoint security policies to prevent privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Description
Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
AI-Powered Analysis
Technical Analysis
CVE-2025-67450 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Eaton's UPS Companion software. The root cause is insecure library loading within the software executable, which allows an attacker with local access to influence the search path for dynamic libraries. By placing a malicious library in a location that the software searches before the legitimate one, an attacker can cause the software to load and execute arbitrary code. This form of attack requires the attacker to have at least low-level privileges on the system but does not require user interaction, making it a potent vector for privilege escalation or persistence. The vulnerability affects all versions prior to the patched release, which Eaton has made available on their official download center. The CVSS v3.1 score of 7.8 reflects a high severity due to the combined impact on confidentiality, integrity, and availability, and the scope being changed (S:C) indicating potential compromise beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where UPS Companion software is used to manage critical power infrastructure. The vulnerability could be leveraged to disrupt power management, cause operational downtime, or facilitate further network intrusion.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity and security, especially for those relying on Eaton UPS systems for critical infrastructure such as data centers, hospitals, manufacturing plants, and financial institutions. Successful exploitation could lead to arbitrary code execution with elevated privileges, enabling attackers to disrupt power management, cause system outages, or move laterally within networks. The compromise of UPS management software could also undermine trust in power availability and potentially lead to cascading failures in dependent systems. Given the high integration of Eaton UPS products in European enterprise and industrial sectors, the impact could be widespread, affecting both private and public sector organizations. Additionally, the vulnerability could be exploited as part of a targeted attack against critical infrastructure, increasing the risk of economic and safety consequences.
Mitigation Recommendations
European organizations should immediately verify if Eaton UPS Companion software is deployed within their environments and identify affected versions. The primary mitigation is to upgrade to the latest patched version available from Eaton's official download center. Until patching is complete, organizations should restrict local access to systems running the vulnerable software, enforce strict access controls, and monitor for unusual library loading behavior or unauthorized file placements in directories searched by the software. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Network segmentation should be used to isolate critical UPS management systems from general user networks to reduce the risk of local exploitation. Additionally, organizations should review and harden endpoint security policies to prevent privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Eaton
- Date Reserved
- 2025-12-08T12:25:10.744Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694e3453f3b146189c0afb82
Added to database: 12/26/2025, 7:08:03 AM
Last enriched: 12/26/2025, 7:23:17 AM
Last updated: 2/7/2026, 11:11:42 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.