Improper input validation at one of the endpoints of Eaton xComfort ECI's
web interface, could lead into an attacker with network access to the device executing privileged user commands. As cybersecurity
standards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the
product. Upon retirement or end of support, there will be no new security updates, non-security
updates, or paid assisted support options, or online technical content updates.
References
| Link | Resource |
|---|---|
| https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1022.pdf | Vendor Advisory |
Configurations
History
18 Feb 2026, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Eaton xcomfort Ethernet Communication Interface
Eaton |
|
| References | () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1022.pdf - Vendor Advisory | |
| CPE | cpe:2.3:a:eaton:xcomfort_ethernet_communication_interface:*:*:*:*:*:*:*:* |
23 Dec 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-23 12:15
Updated : 2026-02-18 14:39
NVD link : CVE-2025-59886
Mitre link : CVE-2025-59886
CVE.ORG link : CVE-2025-59886
JSON object : View
Products Affected
eaton
- xcomfort_ethernet_communication_interface
CWE
CWE-20
Improper Input Validation
