The vulnerability, if exploited, could allow an authenticated miscreant
(OS standard user) to tamper with TCL Macro scripts and escalate
privileges to OS system, potentially resulting in complete compromise of
the model application server.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-015-01.json | Third Party Advisory |
| https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea | Permissions Required |
| https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2026-01-16 02:16
Updated : 2026-01-22 15:15
NVD link : CVE-2025-64691
Mitre link : CVE-2025-64691
CVE.ORG link : CVE-2025-64691
JSON object : View
Products Affected
aveva
- process_optimization
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
