AVEVA Process Optimization
AVEVA Process Optimization versions 2024.1 and earlier contain multiple critical vulnerabilities including remote code execution (CWE-94), SQL injection (CWE-89), privilege escalation (CWE-862), and insecure cryptographic practices (CWE-319). The vulnerabilities are remotely exploitable without authentication via the default listening ports (8888/8889 TLS). Successful exploitation could enable attackers to execute arbitrary code, manipulate process data, escalate privileges, and access sensitive information.
- Network access to port 8888 or 8889 (TLS) on the AVEVA Process Optimization server
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c94f88d3-85bc-4b0f-ac52-0516be37e0aaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.