The vulnerability, if exploited, could allow an authenticated miscreant
(OS Standard User) to tamper with Process Optimization project files,
embed code, and escalate their privileges to the identity of a victim
user who subsequently interacts with the project files.
Advisories

No advisories yet.

Fixes

Solution

AVEVA recommends users take the following action: * Update to AVEVA Process Optimization v2025 https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .


Workaround

AVEVA alternatively recommends the following actions users can take to mitigate risk: * Apply host and/or network firewall rules restricting the taoimr service to accept traffic only from trusted source(s). By default, AVEVA Process Optimization listens on port 8888/8889(TLS). Please refer to the AVEVA Process Optimization Installation Guide for additional details on ports configuration. * Apply ACLs to the installation and data folders, limiting write-access to trusted users only. * Maintain a trusted chain-of-custody on Process Optimization project files during creation, modification, distribution, backups, and use. For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .

History

Fri, 16 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
Title AVEVA Process Optimization Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-16T00:12:45.798Z

Reserved: 2025-11-24T18:22:00.798Z

Link: CVE-2025-64729

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T02:16:45.467

Modified: 2026-01-16T02:16:45.467

Link: CVE-2025-64729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses