{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T20:37:58.159","vulnerabilities":[{"cve":{"id":"CVE-2025-59886","sourceIdentifier":"CybersecurityCOE@eaton.com","published":"2025-12-23T12:15:45.170","lastModified":"2026-02-18T14:39:24.770","vulnStatus":"Analyzed","cveTags":[{"sourceIdentifier":"CybersecurityCOE@eaton.com","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"Improper input validation at one of the endpoints of Eaton xComfort ECI's \n\nweb interface, could lead into an attacker with network access to the device executing privileged user commands. As cybersecurity\nstandards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the\nproduct. Upon retirement or end of support, there will be no new security updates, non-security\nupdates, or paid assisted support options, or online technical content updates."}],"metrics":{"cvssMetricV31":[{"source":"CybersecurityCOE@eaton.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"CybersecurityCOE@eaton.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eaton:xcomfort_ethernet_communication_interface:*:*:*:*:*:*:*:*","matchCriteriaId":"E0285649-DF6F-4C26-9BAB-3023CCABF5D9"}]}]}],"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1022.pdf","source":"CybersecurityCOE@eaton.com","tags":["Vendor Advisory"]}]}}]}