web interface, could lead into an attacker with network access to the device executing privileged user commands. As cybersecurity
standards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the
product. Upon retirement or end of support, there will be no new security updates, non-security
updates, or paid assisted support options, or online technical content updates.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eaton
Eaton xcomfort Ethernet Communication Interface |
|
| Vendors & Products |
Eaton
Eaton xcomfort Ethernet Communication Interface |
Tue, 23 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation at one of the endpoints of Eaton xComfort ECI's web interface, could lead into an attacker with network access to the device executing privileged user commands. As cybersecurity standards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the product. Upon retirement or end of support, there will be no new security updates, non-security updates, or paid assisted support options, or online technical content updates. | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2025-12-23T14:43:39.363Z
Reserved: 2025-09-23T08:34:05.389Z
Link: CVE-2025-59886
Updated: 2025-12-23T14:43:30.832Z
Status : Awaiting Analysis
Published: 2025-12-23T12:15:45.170
Modified: 2025-12-23T14:51:52.650
Link: CVE-2025-59886
No data.
OpenCVE Enrichment
Updated: 2025-12-23T22:39:44Z