Cyber Posture

CVE-2025-64769

High

Published: 16 January 2026

Published
16 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0001 0.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-64769 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Aveva Process Optimization. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-319

Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.

addresses: CWE-319

By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.

addresses: CWE-319

Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.

addresses: CWE-319

Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.

addresses: CWE-319

Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.

addresses: CWE-319

Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.

addresses: CWE-319

Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.

addresses: CWE-319

Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Unencrypted channels (CWE-319) directly enable passive network sniffing (T1040) and active MITM interception/modification (T1557) on adjacent networks.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.

Deeper analysisAI

CVE-2025-64769 is a vulnerability in the Process Optimization application suite, where connection channels and protocols are not encrypted by default. This exposes communications to potential hijacking or data leakage in man-in-the-middle attacks or passive inspection scenarios. The issue is rated with a CVSS v3.1 base score of 7.1 (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L) and is associated with CWE-319 (Cleartext Transmission of Sensitive Information).

The vulnerability can be exploited by unauthenticated attackers (PR:N) with adjacent network access (AV:A), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation allows high-impact confidentiality and integrity violations, such as data interception or modification, alongside low availability impact (A:L), all within unchanged scope (S:U).

Advisories including CISA's ICSA-26-015-01 and AVEVA's software support and cyber-security updates provide details on mitigations and patches; practitioners should consult https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01, https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea, and https://www.aveva.com/en/support-and-success/cyber-security-updates/ for remediation guidance.

Details

CWE(s)

Affected Products

aveva
process optimization
≤ 2025

CVEs Like This One

CVE-2025-61937Same product: Aveva Process Optimization
CVE-2025-61943Same product: Aveva Process Optimization
CVE-2025-65118Same product: Aveva Process Optimization
CVE-2025-64729Same product: Aveva Process Optimization
CVE-2025-65117Same product: Aveva Process Optimization
CVE-2025-64691Same product: Aveva Process Optimization
CVE-2025-34271Shared CWE-319
CVE-2026-5115Shared CWE-319
CVE-2026-24060Shared CWE-319
CVE-2026-31923Shared CWE-319

References