In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Resource Using Incompatible Type vulnerability can be exploited to cause memory corruption while parsing specially crafted .ctl files. This could allow an attacker to execute code in the context of the current process.
Advisories

No advisories yet.

Fixes

Solution

AzeoTech has released the following update that addresses these issues: * DAQFactory: Release 21.1 AzeoTech also recommends users take the following actions to reduce the risk: * Users are discouraged from using documents from unknown/untrusted sources. * Users are encouraged to store .ctl files in a folder only writeable by admin-level users. * Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control. * Users are encouraged to apply a document editing password to their documents.


Workaround

No workaround given by the vendor.

History

Fri, 02 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:azeotech:daqfactory:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 16 Dec 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Azeotech
Azeotech daqfactory
Vendors & Products Azeotech
Azeotech daqfactory

Thu, 11 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Resource Using Incompatible Type vulnerability can be exploited to cause memory corruption while parsing specially crafted .ctl files. This could allow an attacker to execute code in the context of the current process.
Title Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in AzeoTech DAQFactory
Weaknesses CWE-843
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-30T19:59:33.937Z

Reserved: 2025-12-04T21:11:02.201Z

Link: CVE-2025-66586

cve-icon Vulnrichment

Updated: 2025-12-15T20:30:21.403Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T21:15:57.583

Modified: 2026-01-02T20:06:35.170

Link: CVE-2025-66586

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T08:49:37Z

Weaknesses