CVE-2025-67450

7.8 HIGH

📋 TL;DR

The Eaton UPS Companion software has a vulnerability where insecure library loading allows attackers with access to the software package to execute arbitrary code. This affects all users running vulnerable versions of the Eaton UPS Companion software. Attackers could potentially gain control of systems running this UPS management software.

💻 Affected Systems

Products:
  • Eaton UPS Companion software
Versions: All versions prior to the latest fixed version
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the software executable itself and affects default installations. Requires attacker access to the software package.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, installing persistent malware, and using the system as a foothold for lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to the UPS management system, potential data exfiltration, and disruption of power management functions.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing attackers from reaching vulnerable systems.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the software package, making internet-facing exploitation unlikely unless the software is exposed through other means.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this vulnerability to gain elevated privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system or ability to place malicious files in the software's execution path. The CWE-427 (Uncontrolled Search Path Element) vulnerability makes exploitation relatively straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version available on Eaton download center

Vendor Advisory: https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1027.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Eaton download center
2. Uninstall the current vulnerable version
3. Install the updated version
4. Restart the system to ensure all components are properly loaded

🔧 Temporary Workarounds

Restrict software access

all

Limit access to the Eaton UPS Companion software installation directory and executable to authorized users only

Implement application whitelisting

all

Use application control solutions to only allow execution of signed, authorized binaries

🧯 If You Can't Patch

  • Implement strict access controls to limit who can interact with the UPS Companion software
  • Segment the network to isolate UPS management systems from general user networks

🔍 How to Verify

Check if Vulnerable:

Check the software version in the application's about section or through the installed programs list in Windows Control Panel

Check Version:

On Windows: Check Add/Remove Programs or run the software and check Help > About. On Linux: Check package manager or installation directory for version information.

Verify Fix Applied:

Verify the installed version matches the latest version from Eaton's download center and check that the software loads only from secure locations

📡 Detection & Monitoring

Log Indicators:

  • Unexpected library loading from non-standard paths
  • Process creation events for Eaton UPS Companion with unusual parent processes
  • Failed attempts to access restricted directories by the software

Network Indicators:

  • Unusual outbound connections from systems running Eaton UPS Companion
  • Network traffic to/from UPS management systems during non-business hours

SIEM Query:

Process creation where parent_process_name contains 'eaton' or 'ups' AND process_name not in (approved_eaton_processes_list)

🔗 References

📤 Share & Export