CyberSecurityNews

Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges


Seven vulnerabilities were disclosed in Process Optimization (formerly ROMeo) 2024.1 and earlier on January 13, 2026, including a critical flaw enabling unauthenticated SYSTEM-level remote code execution.

The most severe vulnerability enables unauthenticated attackers to achieve remote code execution under system privileges, posing an immediate risk to industrial process control environments worldwide.​

The primary threat stems from a critical code injection vulnerability in the application’s API layer. An unauthenticated attacker can exploit this flaw to execute arbitrary code with full system privileges on the “taoimr” service.

Potentially compromising the entire Model Application Server and connected infrastructure.

Vulnerability Summary

This attack requires no user interaction, is low-complexity, and can be executed remotely over the network, making it exceptionally dangerous for organizations running vulnerable versions.​

Additional severe vulnerabilities include code injection via macro functionality that allows authenticated users to escalate from standard OS user to system-level privileges.

google

CVE IDTypeCVSS v4.0SeverityImpact
CVE-2025-61937Remote Code Execution (API)10.0CriticalUnauthenticated RCE under system privileges
CVE-2025-64691Code Injection (Macros)9.3CriticalPrivilege escalation via TCL scripts
CVE-2025-61943SQL Injection9.3CriticalSQL Server admin code execution
CVE-2025-65118DLL Hijacking9.3CriticalSystem privilege escalation
CVE-2025-64729Missing ACLs8.6HighProject file tampering & privilege escalation
CVE-2025-65117Embedded OLE Objects8.5HighMalicious content delivery
CVE-2025-64769Cleartext Transmission7.6HighData interception via Man-in-the-Middle

SQL injection flaws in the Captive Historian component that grant attackers SQL Server administrative access.

A DLL hijacking vulnerability enables authenticated users to load arbitrary code and elevate their privileges to system-level.

These attack vectors collectively demonstrate sophisticated exploitation pathways that could completely compromise affected systems.​

AVEVA recommends immediate action: organizations should upgrade to AVEVA Process Optimization 2025 or higher to patch all identified vulnerabilities.

As an interim defensive measure, administrators should implement network firewall rules restricting the taoimr service (default ports 8888/8889) to trusted sources only.

Apply strict access control lists to installation and data folders, and maintain rigorous change management for project files.

The vulnerabilities were discovered during a planned penetration test by Veracode security researcher Christopher Wu and coordinated with CISA.​

Organizations operating AVEVA Process Optimization environments should prioritize patching immediately to prevent exploitation of these critical flaws in their industrial control systems infrastructure.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link