The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
History

Fri, 16 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Aveva
Aveva process Optimization
Vendors & Products Aveva
Aveva process Optimization

Fri, 16 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
Title AVEVA Process Optimization Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2026-01-16T00:12:45.798Z

Updated: 2026-01-16T14:53:45.166Z

Reserved: 2025-11-24T18:22:00.798Z

Link: CVE-2025-64729

cve-icon Vulnrichment

Updated: 2026-01-16T14:53:40.130Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-16T02:16:45.467

Modified: 2026-01-16T15:55:12.257

Link: CVE-2025-64729

cve-icon Redhat

No data.