CVE-2025-64769
- EPSS 0.01%
- Veröffentlicht 16.01.2026 00:16:48
- Zuletzt bearbeitet 22.01.2026 15:11:11
The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.
CVE-2025-65117
- EPSS 0.01%
- Veröffentlicht 16.01.2026 00:14:27
- Zuletzt bearbeitet 22.01.2026 15:14:11
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Designer User) to embed OLE objects into graphics, and escalate their privileges to the identity of a victim user who subsequently interacts with the gra...
CVE-2025-64729
- EPSS 0.01%
- Veröffentlicht 16.01.2026 00:12:45
- Zuletzt bearbeitet 22.01.2026 15:15:10
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts wit...
CVE-2025-65118
- EPSS 0.01%
- Veröffentlicht 16.01.2026 00:11:12
- Zuletzt bearbeitet 22.01.2026 15:13:00
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the...
CVE-2025-61943
- EPSS 0.02%
- Veröffentlicht 16.01.2026 00:09:18
- Zuletzt bearbeitet 22.01.2026 15:19:41
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Standard User) to tamper with queries in Captive Historian and achieve code execution under SQL Server administrative privileges, potentially resulting i...
CVE-2025-64691
- EPSS 0.02%
- Veröffentlicht 16.01.2026 00:06:56
- Zuletzt bearbeitet 22.01.2026 15:15:51
The vulnerability, if exploited, could allow an authenticated miscreant (OS standard user) to tamper with TCL Macro scripts and escalate privileges to OS system, potentially resulting in complete compromise of the model application server.
- EPSS 0.35%
- Veröffentlicht 16.01.2026 00:04:37
- Zuletzt bearbeitet 22.01.2026 15:20:43
The vulnerability, if exploited, could allow an unauthenticated miscreant to achieve remote code execution under OS system privileges of “taoimr” service, potentially resulting in complete compromise of the model application server.