Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges

Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges

Posted on January 20, 2026January 20, 2026 By CWS

Seven vulnerabilities had been disclosed in Course of Optimization (previously ROMeo) 2024.1 and earlier on January 13, 2026, together with a essential flaw enabling unauthenticated SYSTEM-level distant code execution.

Probably the most extreme vulnerability allows unauthenticated attackers to realize distant code execution underneath system privileges, posing an instantaneous danger to industrial course of management environments worldwide.​

The first risk stems from a essential code injection vulnerability within the utility’s API layer. An unauthenticated attacker can exploit this flaw to execute arbitrary code with full system privileges on the “taoimr” service.

Probably compromising your complete Mannequin Utility Server and related infrastructure.

Vulnerability Abstract

This assault requires no consumer interplay, is low-complexity, and could be executed remotely over the community, making it exceptionally harmful for organizations working susceptible variations.​

Further extreme vulnerabilities embrace code injection through macro performance that permits authenticated customers to escalate from customary OS consumer to system-level privileges.

CVE IDTypeCVSS v4.0SeverityImpactCVE-2025-61937Remote Code Execution (API)10.0CriticalUnauthenticated RCE underneath system privilegesCVE-2025-64691Code Injection (Macros)9.3CriticalPrivilege escalation through TCL scriptsCVE-2025-61943SQL Injection9.3CriticalSQL Server admin code executionCVE-2025-65118DLL Hijacking9.3CriticalSystem privilege escalationCVE-2025-64729Missing ACLs8.6HighProject file tampering & privilege escalationCVE-2025-65117Embedded OLE Objects8.5HighMalicious content material deliveryCVE-2025-64769Cleartext Transmission7.6HighData interception through Man-in-the-Center

SQL injection flaws within the Captive Historian part that grant attackers SQL Server administrative entry.

A DLL hijacking vulnerability allows authenticated customers to load arbitrary code and elevate their privileges to system-level.

These assault vectors collectively show subtle exploitation pathways that would fully compromise affected techniques.​

AVEVA recommends speedy motion: organizations ought to improve to AVEVA Course of Optimization 2025 or greater to patch all recognized vulnerabilities.

As an interim defensive measure, directors ought to implement community firewall guidelines limiting the taoimr service (default ports 8888/8889) to trusted sources solely.

Apply strict entry management lists to set up and information folders, and preserve rigorous change administration for undertaking recordsdata.

The vulnerabilities had been found throughout a deliberate penetration check by Veracode safety researcher Christopher Wu and coordinated with CISA.​

Organizations working AVEVA Course of Optimization environments ought to prioritize patching instantly to forestall exploitation of those essential flaws of their industrial management techniques infrastructure.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Aveva, Code, Critical, Enables, Execution, Privileges, Remote, Software, System, Vulnerabilities

Post navigation

Previous Post: Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
Next Post: Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Related Posts

Microsoft 365 Introduces Copilot Cowork for Task Automation Microsoft 365 Introduces Copilot Cowork for Task Automation Cyber Security News
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
TrustAsia Revoked 143 Certificates Following LiteSSL ACME Service Vulnerability TrustAsia Revoked 143 Certificates Following LiteSSL ACME Service Vulnerability Cyber Security News
Python-Based Malware Targets Windows for Credential Theft Python-Based Malware Targets Windows for Credential Theft Cyber Security News
Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cyber Security News
Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark