Improper authentication of library files in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the software package. This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.
References
| Link | Resource |
|---|---|
| https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1026.pdf | Patch Vendor Advisory |
Configurations
History
18 Feb 2026, 14:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:eaton:ups_companion:*:*:*:*:*:*:*:* | |
| First Time |
Eaton ups Companion
Eaton |
|
| References | () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1026.pdf - Patch, Vendor Advisory |
26 Dec 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-26 07:15
Updated : 2026-02-18 14:37
NVD link : CVE-2025-59887
Mitre link : CVE-2025-59887
CVE.ORG link : CVE-2025-59887
JSON object : View
Products Affected
eaton
- ups_companion
CWE
CWE-427
Uncontrolled Search Path Element
