(OS Standard User) to tamper with Process Optimization project files,
embed code, and escalate their privileges to the identity of a victim
user who subsequently interacts with the project files.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
AVEVA recommends users take the following action: * Update to AVEVA Process Optimization v2025 https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Workaround
AVEVA alternatively recommends the following actions users can take to mitigate risk: * Apply host and/or network firewall rules restricting the taoimr service to accept traffic only from trusted source(s). By default, AVEVA Process Optimization listens on port 8888/8889(TLS). Please refer to the AVEVA Process Optimization Installation Guide for additional details on ports configuration. * Apply ACLs to the installation and data folders, limiting write-access to trusted users only. * Maintain a trusted chain-of-custody on Process Optimization project files during creation, modification, distribution, backups, and use. For more information, please AVEVA's security bulletin AVEVA-2026-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Fri, 16 Jan 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files. | |
| Title | AVEVA Process Optimization Missing Authorization | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-01-16T00:12:45.798Z
Reserved: 2025-11-24T18:22:00.798Z
Link: CVE-2025-64729
No data.
Status : Received
Published: 2026-01-16T02:16:45.467
Modified: 2026-01-16T02:16:45.467
Link: CVE-2025-64729
No data.
OpenCVE Enrichment
No data.