CVE-2025-65117
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-16

Last updated on: 2026-01-16

Assigner: ICS-CERT

Description
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Designer User) to embed OLE objects into graphics, and escalate their privileges to the identity of a victim user who subsequently interacts with the graphical elements.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-16
Last Modified
2026-01-16
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 14 associated CPEs
Vendor Product Version / Range
aveva pi_integrator_for_business_analytics to 2020_r2_sp1 (exc)
aveva pi_web_api *
aveva pi_connector_for_cygnet *
aveva pi_data_archive *
aveva suitelink_server *
aveva historian_server *
aveva pi_af_client *
aveva edge *
aveva pi_server *
aveva operations_control_logger *
aveva plant_scada *
aveva telemetry_server *
aveva in_touch_access_anywhere *
aveva system_platform *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-676 The product invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows an authenticated user with Process Optimization Designer privileges to embed OLE objects into graphics. By doing so, the attacker can escalate their privileges to impersonate a victim user who interacts with these graphical elements, potentially gaining unauthorized access or control.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to privilege escalation, allowing an attacker to assume the identity of another user. This can result in unauthorized access to sensitive information or systems, potentially compromising the integrity and confidentiality of your environment.


What immediate steps should I take to mitigate this vulnerability?

Apply the latest security updates and patches provided by AVEVA for the affected products. These updates address multiple vulnerabilities, including privilege escalation risks like CVE-2025-65117, and are part of ongoing security bulletins released by AVEVA to mitigate such issues. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart