CVE-2025-67450

insecure · insecure Multiple Products

A high-severity vulnerability has been identified in multiple products from the vendor 'insecure', specifically within the Eaton UPS Companion software.

Executive summary

A high-severity vulnerability has been identified in multiple products from the vendor 'insecure', specifically within the Eaton UPS Companion software. This flaw, resulting from insecure library loading, could allow an attacker with local access to the software to execute arbitrary code on an affected system, potentially leading to a full system compromise. Organizations are urged to apply the vendor-supplied security updates immediately to mitigate this risk.

Vulnerability

The vulnerability exists due to an insecure library loading mechanism, commonly known as DLL Hijacking, within the Eaton UPS Companion software executable. The application attempts to load a required library (DLL) without specifying its full path. An attacker with the ability to place a malicious DLL file with the expected name in a directory that is searched before the legitimate library's location (such as the application's current working directory) can trick the software into loading and executing their malicious code. This results in arbitrary code execution with the permissions of the user running the application.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation leads to arbitrary code execution on the endpoint where the software is installed. This could result in a complete system compromise, allowing an attacker to steal sensitive data, install ransomware or other malware, disable security controls, and potentially use the compromised machine as a pivot point to move laterally within the network. The business risks include data breaches, operational disruption, financial loss, and reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately across all affected systems. The patches correct the insecure library loading behavior by ensuring the application loads libraries from a trusted, specified path.

Proactive Monitoring: Monitor for exploitation attempts by reviewing security logs for unusual activity related to the Eaton UPS Companion executable. Specifically, look for unexpected DLL files being written to the application's directory and monitor for suspicious child processes spawned by the software. Configure Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) systems to alert on such behaviors.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Use application control or whitelisting solutions to prevent the loading of unauthorized DLLs. Harden file system permissions on the application installation directories to prevent unprivileged users from writing malicious files.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 7.8 and the potential for complete system compromise, it is strongly recommended that organizations prioritize the deployment of the vendor-provided patches. While there is no evidence of active exploitation at this time, the simplicity of exploiting this type of vulnerability means the risk of future attacks is significant. Organizations should treat this as a high-priority finding and adhere to their internal policies for remediating high-severity vulnerabilities.