Summary
Successful exploitation of these vulnerabilities could enable an attacker to execute remote code, perform SQL injection, escalate privileges, or access sensitive information.
The following versions of AVEVA Process Optimization are affected:
- Process Optimization (CVE-2025-61937, CVE-2025-64691, CVE-2025-61943, CVE-2025-65118, CVE-2025-64729, CVE-2025-65117, CVE-2025-64769)
| CVSS | Vendor | Equipment | Vulnerabilities |
|---|---|---|---|
| v3 10 | AVEVA | AVEVA Process Optimization | Improper Control of Generation of Code (‘Code Injection’), Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), Uncontrolled Search Path Element, Missing Authorization, Use of Potentially Dangerous Function, Cleartext Transmission of Sensitive Information |
Background
- Critical Infrastructure Sectors: Critical Manufacturing
- Countries/Areas Deployed: Worldwide
- Company Headquarters Location: United Kingdom
Vulnerabilities
CVE-2025-61937
The vulnerability, if exploited, could allow an unauthenticated miscreant to achieve remote code execution under OS System privileges of “taoimr” service, potentially resulting in complete compromise of the Model Application Server.
Affected Products
AVEVA Process Optimization
Vendor:
AVEVA
AVEVA
Product Version:
AVEVA Process Optimization: <=2024.1
AVEVA Process Optimization: <=2024.1
Product Status:
known_affected
known_affected
Remediations
Mitigation[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from All CISA Advisories
Read the original article: