Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software

0
High
VulnerabilityCVE-2025-67450cvecve-2025-67450cwe-427
Published: Fri Dec 26 2025 (12/26/2025, 06:59:41 UTC)
Source: CVE Database V5
Vendor/Project: Eaton
Product: UPS Companion software

Description

Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.

AI-Powered Analysis

AILast updated: 12/26/2025, 07:23:17 UTC

Technical Analysis

CVE-2025-67450 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Eaton's UPS Companion software. The root cause is insecure library loading within the software executable, which allows an attacker with local access to influence the search path for dynamic libraries. By placing a malicious library in a location that the software searches before the legitimate one, an attacker can cause the software to load and execute arbitrary code. This form of attack requires the attacker to have at least low-level privileges on the system but does not require user interaction, making it a potent vector for privilege escalation or persistence. The vulnerability affects all versions prior to the patched release, which Eaton has made available on their official download center. The CVSS v3.1 score of 7.8 reflects a high severity due to the combined impact on confidentiality, integrity, and availability, and the scope being changed (S:C) indicating potential compromise beyond the initially vulnerable component. Although no exploits are currently known in the wild, the vulnerability's nature and impact make it a significant risk, especially in environments where UPS Companion software is used to manage critical power infrastructure. The vulnerability could be leveraged to disrupt power management, cause operational downtime, or facilitate further network intrusion.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity and security, especially for those relying on Eaton UPS systems for critical infrastructure such as data centers, hospitals, manufacturing plants, and financial institutions. Successful exploitation could lead to arbitrary code execution with elevated privileges, enabling attackers to disrupt power management, cause system outages, or move laterally within networks. The compromise of UPS management software could also undermine trust in power availability and potentially lead to cascading failures in dependent systems. Given the high integration of Eaton UPS products in European enterprise and industrial sectors, the impact could be widespread, affecting both private and public sector organizations. Additionally, the vulnerability could be exploited as part of a targeted attack against critical infrastructure, increasing the risk of economic and safety consequences.

Mitigation Recommendations

European organizations should immediately verify if Eaton UPS Companion software is deployed within their environments and identify affected versions. The primary mitigation is to upgrade to the latest patched version available from Eaton's official download center. Until patching is complete, organizations should restrict local access to systems running the vulnerable software, enforce strict access controls, and monitor for unusual library loading behavior or unauthorized file placements in directories searched by the software. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Network segmentation should be used to isolate critical UPS management systems from general user networks to reduce the risk of local exploitation. Additionally, organizations should review and harden endpoint security policies to prevent privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Eaton
Date Reserved
2025-12-08T12:25:10.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694e3453f3b146189c0afb82

Added to database: 12/26/2025, 7:08:03 AM

Last enriched: 12/26/2025, 7:23:17 AM

Last updated: 12/26/2025, 9:25:31 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats