Home

Description

The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.

PUBLISHED Reserved 2025-11-24 | Published 2026-01-16 | Updated 2026-01-16 | Assigner icscert




HIGH: 7.1CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

HIGH: 7.6CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-319

Product status

Default status
unaffected

Any version
affected

Credits

Christopher Wu of Veracode reported these vulnerabilities to AVEVA. finder

References

www.aveva.com/en/support-and-success/cyber-security-updates/

softwaresupportsp.aveva.com/...3-0d85-4fde-ac11-5239e87a68ea

www.cisa.gov/news-events/ics-advisories/icsa-26-015-01

github.com/...p/csaf_files/OT/white/2026/icsa-26-015-01.json

cve.org (CVE-2025-64769)

nvd.nist.gov (CVE-2025-64769)

Download JSON