CVE-2025-64729
Published: 16 January 2026
Summary
CVE-2025-64729 is a high-severity Missing Authorization (CWE-862) vulnerability in Aveva Process Optimization. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CWE-862 missing authorization by enforcing logical access controls to prevent authenticated standard users from tampering with Process Optimization project files.
Enforces least privilege to restrict OS standard users from modifying project files, blocking the tampering that enables code embedding and privilege escalation.
Limits change access to project files to authorized users or roles, preventing unauthorized modifications that lead to embedded code execution and victim privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization allows low-priv local user to modify project files and embed executable code; victims opening the files trigger code execution, directly enabling local privilege escalation.
NVD Description
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
Deeper analysisAI
CVE-2025-64729, published on 2026-01-16, is a high-severity vulnerability (CVSS v3.1 score of 8.1: AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L) tied to CWE-862 (Missing Authorization) in AVEVA Process Optimization software. It enables an authenticated OS standard user to tamper with project files, embed code within them, and potentially leverage this for privilege escalation against users who interact with the modified files.
The attack requires local access and low-privilege authentication as an OS standard user, with low complexity but user interaction from a victim. An exploiter can modify Process Optimization project files to include embedded code, allowing privilege escalation to the identity of any victim user who subsequently opens or processes those files, resulting in high confidentiality and integrity impacts alongside changed scope.
CISA ICS Advisory ICSA-26-015-01, along with AVEVA's software support downloads and cyber-security updates page, detail patches and mitigation guidance. A corresponding CSAF JSON file is available via the CISAgov GitHub repository.
Details
- CWE(s)