The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the Model Application Server.
History

Fri, 16 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the Model Application Server.
Title AVEVA Process Optimization Uncontrolled Search Path Element
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-16T00:11:12.560Z

Reserved: 2025-11-24T18:22:00.785Z

Link: CVE-2025-65118

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T02:16:46.003

Modified: 2026-01-16T02:16:46.003

Link: CVE-2025-65118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.