CVE-2025-66590
Published: 11 December 2025
Summary
CVE-2025-66590 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Azeotech Daqfactory. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the out-of-bounds write flaw in DAQFactory 20.7 Build 2555 to eliminate the vulnerability.
Implements memory protection controls such as address space layout randomization and data execution prevention to mitigate exploitation of the out-of-bounds write vulnerability.
Enforces boundary protection to restrict unauthenticated network access to the vulnerable DAQFactory instance, preventing remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated out-of-bounds write vulnerability in network-accessible DAQFactory enables arbitrary code execution, directly mapping to exploitation of public-facing application.
NVD Description
In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Write vulnerability can be exploited by an attacker to cause the program to write data past the end of an allocated memory buffer. This can lead to arbitrary code execution or…
more
a system crash.
Deeper analysisAI
CVE-2025-66590 is an Out-of-bounds Write vulnerability (CWE-787) affecting AzeoTech DAQFactory release 20.7 (Build 2555). The flaw allows an attacker to write data past the end of an allocated memory buffer, potentially leading to arbitrary code execution or a system crash. It has been assigned a CVSS v3.1 base score of 9.8, reflecting its critical severity.
The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and results in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) in an unchanged scope (S:U). Any unauthenticated attacker with network access to a vulnerable DAQFactory instance could trigger the out-of-bounds write, enabling arbitrary code execution on the target system or causing a denial-of-service via crash.
The CISA ICS Advisory ICSA-25-345-03 (https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-03) provides additional details on the vulnerability and recommended mitigations.
Details
- CWE(s)