CVE-2025-54460

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated users with publication target creation/access privileges to upload and persist files that could be executed. It affects AVEVA products with Text File or HDFS publication target functionality. Attackers could achieve remote code execution through file upload.

💻 Affected Systems

Products:
  • AVEVA PI System
  • AVEVA PI AF
  • AVEVA PI Vision
Versions: Multiple versions prior to security updates
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with privileges to create or access Text File or HDFS publication targets.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker achieves remote code execution with system-level privileges, leading to complete system compromise, data theft, and lateral movement.

🟠

Likely Case

Privileged insider or compromised account uploads malicious files that get executed, leading to data exfiltration or persistence mechanisms.

🟢

If Mitigated

With proper access controls and file validation, impact limited to unauthorized file storage without execution.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if web interfaces are exposed.
🏢 Internal Only: HIGH - Internal users with appropriate privileges can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific privileges. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to AVEVA Security Bulletin AVEVA-2025-004 for specific version updates

Vendor Advisory: https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2025-004.pdf

Restart Required: Yes

Instructions:

1. Review AVEVA Security Bulletin AVEVA-2025-004. 2. Download and apply the appropriate security updates from AVEVA support portal. 3. Restart affected services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Publication Target Privileges

all

Limit user privileges for creating or accessing Text File and HDFS publication targets to only essential personnel.

Implement File Upload Validation

all

Add server-side validation to block executable file uploads through publication targets.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for publication target functionality
  • Monitor file upload activities and implement file integrity monitoring on publication target directories

🔍 How to Verify

Check if Vulnerable:

Check if running affected AVEVA product versions and if users have publication target privileges.

Check Version:

Check AVEVA product documentation for version checking commands specific to each product.

Verify Fix Applied:

Verify installed version matches patched versions listed in AVEVA-2025-004 and test file upload functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to publication targets
  • Multiple failed upload attempts
  • User privilege escalation attempts

Network Indicators:

  • Unexpected outbound connections from AVEVA servers
  • File transfer to unusual destinations

SIEM Query:

source="AVEVA" AND (event="file_upload" OR event="publication_target_create") AND file_extension IN ("exe", "bat", "sh", "ps1")

🔗 References

📤 Share & Export