CVE-2025-64691
BaseFortify
Publication date: 2026-01-16
Last updated on: 2026-01-16
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aveva | pi_integrator_for_business_analytics | to 2020_r2_sp1 (exc) |
| aveva | pi_web_api | * |
| aveva | pi_connector_for_cygnet | * |
| aveva | pi_data_archive | * |
| aveva | suitelink_server | * |
| aveva | historian_server | * |
| aveva | pi_af_client | * |
| aveva | edge | * |
| aveva | pi_server | * |
| aveva | operations_control_logger | * |
| aveva | plant_scada | * |
| aveva | telemetry_server | * |
| aveva | in_touch_access_anywhere | * |
| aveva | system_platform | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an authenticated user with standard OS privileges to tamper with TCL Macro scripts and escalate their privileges to the OS system level. This escalation can potentially lead to a complete compromise of the model application server.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to a complete compromise of the model application server by allowing privilege escalation from a standard user to system-level access. This could result in unauthorized control over the server and its operations.
What immediate steps should I take to mitigate this vulnerability?
Apply the latest security updates and patches provided by AVEVA for the affected products to mitigate this vulnerability. Ensure that only authenticated users have access to the system and monitor for any unauthorized tampering with TCL Macro scripts. Follow AVEVA's security bulletins and advisories for detailed mitigation instructions. [1]