CVE-2025-65118
Published: 16 January 2026
Summary
CVE-2025-65118 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Aveva Process Optimization. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Search Order Hijacking (T1038); ranked at the 0.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the CWE-427 untrusted search path vulnerability by requiring timely patching of the affected Process Optimization services in AVEVA's Model Application Server.
Enforces least privilege on services to limit privilege escalation from OS Standard User to OS System even if arbitrary code is loaded via untrusted search path.
Provides software integrity protection and detection of unauthorized changes, preventing or identifying loading of arbitrary code through untrusted search paths in Process Optimization services.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CWE-427 Untrusted Search Path directly enables DLL Search Order Hijacking (T1038) for local privilege escalation to SYSTEM (T1068).
NVD Description
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the Model Application Server.
Deeper analysisAI
CVE-2025-65118 is a CWE-427 (Untrusted Search Path) vulnerability affecting the Process Optimization services within AVEVA's Model Application Server. Published on 2026-01-16, it carries a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for privilege escalation and broad impact.
An authenticated attacker with OS Standard User privileges can exploit this vulnerability locally by tricking the Process Optimization services into loading arbitrary code. Successful exploitation enables escalation to OS System privileges, potentially resulting in complete compromise of the Model Application Server.
CISA's ICS Advisory ICSA-26-015-01 and AVEVA's software support and cyber-security updates provide guidance on mitigation and patches, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01, https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0d85-4fde-ac11-5239e87a68ea, and https://www.aveva.com/en/support-and-success/cyber-security-updates/.
Details
- CWE(s)