CVE-2025-59887

8.6 HIGH

📋 TL;DR

The Eaton UPS Companion software installer fails to properly authenticate library files, allowing attackers who can modify the software package to execute arbitrary code. This affects all systems running vulnerable versions of Eaton UPS Companion software. Attackers need access to the software package before installation to exploit this vulnerability.

💻 Affected Systems

Products:
  • Eaton UPS Companion software
Versions: All versions prior to the latest fixed version
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installer mechanism, affecting all default installations of vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation or execution of malicious payloads during software installation, potentially leading to system compromise if combined with other attack vectors.

🟢

If Mitigated

Limited impact due to restricted access to software packages and proper installation source validation.

🌐 Internet-Facing: LOW - Exploitation requires access to software packages before installation, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Internal attackers with access to software distribution channels could tamper with packages.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to modify software package before installation. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version available on Eaton download center

Vendor Advisory: https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1026.pdf

Restart Required: Yes

Instructions:

1. Download latest Eaton UPS Companion software from Eaton download center. 2. Uninstall previous version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Restrict software package access

all

Limit access to Eaton UPS Companion installation packages to authorized personnel only

Verify package integrity

all

Use checksums or digital signatures to verify software packages before installation

🧯 If You Can't Patch

  • Restrict installation of Eaton UPS Companion to essential systems only
  • Implement strict access controls on software distribution channels and monitor for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check Eaton UPS Companion software version against vendor advisory. Versions prior to latest release are vulnerable.

Check Version:

Check software about/help section or consult vendor documentation for version checking method

Verify Fix Applied:

Verify installation of latest version from Eaton download center and confirm version number matches patched release.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized software installation attempts
  • Modified installer package alerts
  • Unexpected process execution during installation

Network Indicators:

  • Unusual downloads of Eaton software packages
  • Traffic to/from unauthorized software repositories

SIEM Query:

Process creation events during Eaton UPS Companion installation from unexpected sources

🔗 References

📤 Share & Export