The Process Optimization application suite leverages connection
channels/protocols that by-default are not encrypted and could become
subject to hijacking or data leakage in certain man-in-the-middle or
passive inspection scenarios.
Advisories

No advisories yet.

Fixes

Solution

AVEVA recommends users take the following action: * Update to AVEVA Process Optimization v2025 https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .


Workaround

AVEVA alternatively recommends the following actions users can take to mitigate risk: * Apply host and/or network firewall rules restricting the taoimr service to accept traffic only from trusted source(s). By default, AVEVA Process Optimization listens on port 8888/8889(TLS). Please refer to the AVEVA Process Optimization Installation Guide for additional details on ports configuration. * Apply ACLs to the installation and data folders, limiting write-access to trusted users only. * Maintain a trusted chain-of-custody on Process Optimization project files during creation, modification, distribution, backups, and use. For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .

History

Fri, 16 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.
Title AVEVA Process Optimization Cleartext Transmission of Sensitive Information
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}

cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-16T00:16:48.949Z

Reserved: 2025-11-24T18:22:00.813Z

Link: CVE-2025-64769

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T02:16:45.647

Modified: 2026-01-16T02:16:45.647

Link: CVE-2025-64769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses