Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/CyberSecurity News/Eaton Vulnerabilities Allow Arbitrary Code Execution on Hosts
CyberSecurity News

Eaton Vulnerabilities Allow Arbitrary Code Execution on Hosts

A critical security advisory has been released, addressing multiple Vulnerabilities Allow Arbitrary code on the host system, potentially giving them complete control over affected devices. The...

David kimber
David kimber
January 5, 2026 2 Min Read
24 0

A critical security advisory has been released, addressing multiple Vulnerabilities Allow Arbitrary code on the host system, potentially giving them complete control over affected devices.

The advisory, identified as ETN-VA-2025-1026, highlights two specific vulnerabilities affecting all versions of the Eaton UPS Companion software before version 3.0.

The company has classified the overall risk as High, urging users to update their software immediately.

CVE ID Severity Flaw Type Issue Summary
CVE-2025-59887 High (8.6) Insecure Library Loading A flaw in the installer allows attackers to run malicious code by exploiting insecure library loading.
CVE-2025-59888 Medium (6.7) Unquoted Search Path An unquoted search path issue lets local attackers execute malicious files on the system.

Vulnerability Details

The most severe issue, tracked as CVE-2025-59887, carries a CVSS score of 8.6 (High). This vulnerability involves insecure library loading within the software installer.

Security researchers found that an attacker with access to the software package could exploit this flaw to execute arbitrary code.

This type of vulnerability often occurs when an application loads dynamic link libraries (DLLs) from an insecure path, allowing malicious files to be loaded instead of legitimate ones.

The second vulnerability, CVE-2025-59888 (CVSS 6.7), relates to an “improper quotation” issue in the software’s search paths.

In this scenario, if an attacker has access to the local file system, they could place a malicious executable in a specific location that the software unintentionally runs.

This flaw specifically targets how the Windows operating system handles file paths that contain spaces but lack quotation marks.

Eaton has released version 3.0 of the UPS Companion software to patch these flaws. The company strongly advises all customers to migrate to this secure version immediately.

The update is available for download through Eaton’s official software distribution channels. For users unable to apply the patch immediately, Eaton recommends the following mitigation steps: Restrict local and remote access to the host system to authorized personnel only.

Ensure that all control system networks are placed behind securely configured firewalls. Avoid downloading software from unofficial sources to prevent tampering.

By keeping systems up to date and restricting access, organizations can significantly reduce the risk of exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

GHOSTCREW: AI Red Team Toolkit for AI-based Penetration

Next Post

Crimson Collective Claims Breach of Brightspeed Fiber Broadband

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us