Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/CyberSecurity News/Critical AVEVA Flaws Allow Remote Code Execution with
CyberSecurity News

Critical AVEVA Flaws Allow Remote Code Execution with

On January 13, 2026, seven vulnerabilities were disclosed in AVEVA’s Process Optimization (formerly ROMeo) 2024.1 and earlier versions. Crucially, these flaws include a critical vulnerability...

Sarah simpson
Sarah simpson
January 20, 2026 2 Min Read
0 0

On January 13, 2026, seven vulnerabilities were disclosed in AVEVA’s Process Optimization (formerly ROMeo) 2024.1 and earlier versions. Crucially, these flaws include a critical vulnerability that permits unauthenticated SYSTEM-level remote code execution.

The most severe vulnerability enables unauthenticated attackers to achieve remote code execution under system privileges, posing an immediate risk to industrial process control environments worldwide.​

The primary threat stems from a critical code injection vulnerability in the application’s API layer. An unauthenticated attacker can exploit this flaw to execute arbitrary code with full system privileges on the “taoimr” service.

Potentially compromising the entire Model Application Server and connected infrastructure.

Vulnerability Summary

This attack requires no user interaction, is low-complexity, and can be executed remotely over the network, making it exceptionally dangerous for organizations running vulnerable versions.​

Additional severe vulnerabilities include code injection via macro functionality that allows authenticated users to escalate from standard OS user to system-level privileges.

CVE ID Type CVSS v4.0 Severity Impact
CVE-2025-61937 Remote Code Execution (API) 10.0 Critical Unauthenticated RCE under system privileges
CVE-2025-64691 Code Injection (Macros) 9.3 Critical Privilege escalation via TCL scripts
CVE-2025-61943 SQL Injection 9.3 Critical SQL Server admin code execution
CVE-2025-65118 DLL Hijacking 9.3 Critical System privilege escalation
CVE-2025-64729 Missing ACLs 8.6 High Project file tampering & privilege escalation
CVE-2025-65117 Embedded OLE Objects 8.5 High Malicious content delivery
CVE-2025-64769 Cleartext Transmission 7.6 High Data interception via Man-in-the-Middle

SQL injection flaws in the Captive Historian component that grant attackers SQL Server administrative access.

A DLL hijacking vulnerability enables authenticated users to load arbitrary code and elevate their privileges to system-level.

These attack vectors collectively demonstrate sophisticated exploitation pathways that could completely compromise affected systems.​

AVEVA recommends immediate action: organizations should upgrade to AVEVA Process Optimization 2025 or higher to patch all identified vulnerabilities.

As an interim defensive measure, administrators should implement network firewall rules restricting the taoimr service (default ports 8888/8889) to trusted sources only.

Apply strict access control lists to installation and data folders, and maintain rigorous change management for project files.

The vulnerabilities were discovered during a planned penetration test by Veracode security researcher Christopher Wu and coordinated with CISA.​

Organizations operating AVEVA Process Optimization environments should prioritize patching immediately to prevent exploitation of these critical flaws in their industrial control systems infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

SolyxImmortal Python Malware Steals Sensitive Data via

Next Post

Discord Abuse: Clipboard Hijacker Steals Crypto Wallet

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us