{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59888","assignerOrgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","state":"PUBLISHED","assignerShortName":"Eaton","dateReserved":"2025-09-23T08:34:05.389Z","datePublished":"2025-12-26T06:53:33.887Z","dateUpdated":"2026-01-08T04:54:56.884Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"UPS Companion software","vendor":"Eaton","versions":[{"lessThan":"3.0","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2025-12-26T06:48:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Improper quotation in search paths in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the \n\nfile system.  This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.&nbsp;</span>"}],"value":"Improper quotation in search paths in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the \n\nfile system.  This security issue has been fixed in the latest version of EUC which is available on the Eaton download center."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-428","description":"CWE-428 Unquoted Search Path or Element","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","shortName":"Eaton","dateUpdated":"2026-01-08T04:54:56.884Z"},"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1026.pdf"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-26T15:37:33.011545Z","id":"CVE-2025-59888","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-26T15:37:43.044Z"}}]}}