CVE-2025-64769
Published: 16 January 2026
Summary
CVE-2025-64769 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Aveva Process Optimization. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.
By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.
Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.
Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.
Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.
Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.
Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.
Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unencrypted channels (CWE-319) directly enable passive network sniffing (T1040) and active MITM interception/modification (T1557) on adjacent networks.
NVD Description
The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.
Deeper analysisAI
CVE-2025-64769 is a vulnerability in the Process Optimization application suite, where connection channels and protocols are not encrypted by default. This exposes communications to potential hijacking or data leakage in man-in-the-middle attacks or passive inspection scenarios. The issue is rated with a CVSS v3.1 base score of 7.1 (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L) and is associated with CWE-319 (Cleartext Transmission of Sensitive Information).
The vulnerability can be exploited by unauthenticated attackers (PR:N) with adjacent network access (AV:A), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation allows high-impact confidentiality and integrity violations, such as data interception or modification, alongside low availability impact (A:L), all within unchanged scope (S:U).
Advisories including CISA's ICSA-26-015-01 and AVEVA's software support and cyber-security updates provide details on mitigations and patches; practitioners should consult https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01, https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea, and https://www.aveva.com/en/support-and-success/cyber-security-updates/ for remediation guidance.
Details
- CWE(s)