channels/protocols that by-default are not encrypted and could become
subject to hijacking or data leakage in certain man-in-the-middle or
passive inspection scenarios.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
AVEVA recommends users take the following action: * Update to AVEVA Process Optimization v2025 https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Workaround
AVEVA alternatively recommends the following actions users can take to mitigate risk: * Apply host and/or network firewall rules restricting the taoimr service to accept traffic only from trusted source(s). By default, AVEVA Process Optimization listens on port 8888/8889(TLS). Please refer to the AVEVA Process Optimization Installation Guide for additional details on ports configuration. * Apply ACLs to the installation and data folders, limiting write-access to trusted users only. * Maintain a trusted chain-of-custody on Process Optimization project files during creation, modification, distribution, backups, and use. For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Fri, 16 Jan 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios. | |
| Title | AVEVA Process Optimization Cleartext Transmission of Sensitive Information | |
| Weaknesses | CWE-319 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-01-16T00:16:48.949Z
Reserved: 2025-11-24T18:22:00.813Z
Link: CVE-2025-64769
No data.
Status : Received
Published: 2026-01-16T02:16:45.647
Modified: 2026-01-16T02:16:45.647
Link: CVE-2025-64769
No data.
OpenCVE Enrichment
No data.