Critical AVEVA Software Vulnerabilities Enable System-Level RCE and Escalation

Related

CISOs & Cybersecurity Leaders to Watch in Finland’s Telecommunications Industry

Finland’s telecommunications sector underpins everything from consumer connectivity and...

CISOs to Watch in Finland’s Hospital and Healthcare Industry

Finland’s healthcare ecosystem runs on data integrity and operational...

CISOs and Cybersecurity Leaders to Watch in Finland’s Financial Services Industry

Finland’s financial services sector spans retail banking, asset management,...

CISOs and Cybersecurity Leaders to Watch in Finland’s Banking Industry

Finland’s banking sector operates in one of Europe’s most...

Asia-Pacific Reportedly Trails in Blocking Insecure Telnet Traffic

What happened A new analysis shows that many networks in...

Share

What happened

Multiple critical vulnerabilities were disclosed in AVEVA Process Optimization (formerly ROMeo) 2024.1 and earlier, including an unauthenticated remote code execution (RCE) flaw that allows attackers to execute arbitrary code under SYSTEM privileges. Alongside this critical vulnerability (CVE-2025-61937), other high-severity issues include code injection via macro functionality, SQL injection leading to elevated privileges, DLL hijacking, missing ACLs, and issues enabling project file tampering. These weaknesses collectively allow attackers to compromise the Model Application Server and connected infrastructure across industrial process control environments. The vulnerabilities were identified during a penetration test and coordinated with CISA; AVEVA recommends upgrading to the 2025 release to remediate all known flaws. 

Who is affected

Industrial operators and enterprises using AVEVA Process Optimization software are directly impacted; vulnerable systems may be exposed to remote or authenticated compromise of critical control infrastructure.

Why CISOs should care

Critical system-level RCE and privilege escalation flaws in industrial software pose significant operational and safety risks, including potential disruption of production systems and unauthorized command execution.

3 practical actions

  • Apply vendor patches: Upgrade to AVEVA Process Optimization 2025 or later immediately.
  • Segment industrial networks: Restrict access to industrial control system components.
  • Harden access controls: Enforce strict ACL and firewall rules around exposed services.