(OS standard user) to tamper with TCL Macro scripts and escalate
privileges to OS system, potentially resulting in complete compromise of
the model application server.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
AVEVA recommends users take the following action: * Update to AVEVA Process Optimization v2025 https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Workaround
AVEVA alternatively recommends the following actions users can take to mitigate risk: * Apply host and/or network firewall rules restricting the taoimr service to accept traffic only from trusted source(s). By default, AVEVA Process Optimization listens on port 8888/8889(TLS). Please refer to the AVEVA Process Optimization Installation Guide for additional details on ports configuration. * Apply ACLs to the installation and data folders, limiting write-access to trusted users only. * Maintain a trusted chain-of-custody on Process Optimization project files during creation, modification, distribution, backups, and use. For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Fri, 16 Jan 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The vulnerability, if exploited, could allow an authenticated miscreant (OS standard user) to tamper with TCL Macro scripts and escalate privileges to OS system, potentially resulting in complete compromise of the model application server. | |
| Title | AVEVA Process Optimization Code Injection | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-01-16T00:06:56.554Z
Reserved: 2025-11-24T18:22:00.766Z
Link: CVE-2025-64691
No data.
Status : Received
Published: 2026-01-16T02:16:45.293
Modified: 2026-01-16T02:16:45.293
Link: CVE-2025-64691
No data.
OpenCVE Enrichment
No data.