CVE-2025-66590

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in AzeoTech DAQFactory allows attackers to write data beyond allocated memory boundaries, potentially leading to arbitrary code execution or system crashes. All users running DAQFactory release 20.7 (Build 2555) are affected by this out-of-bounds write flaw.

💻 Affected Systems

Products:
  • AzeoTech DAQFactory
Versions: Release 20.7 (Build 2555)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the core DAQFactory application used for industrial data acquisition and control systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the DAQFactory system, potentially leading to data theft, manipulation of industrial processes, or lateral movement within operational technology networks.

🟠

Likely Case

System crashes and denial of service affecting data acquisition and control functions, potentially disrupting industrial operations and causing production downtime.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The CVSS score of 9.8 indicates critical severity with low attack complexity and no authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions than 20.7 (Build 2555)

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-03

Restart Required: Yes

Instructions:

1. Download the latest DAQFactory version from AzeoTech's official website. 2. Backup current configuration and data. 3. Uninstall vulnerable version. 4. Install updated version. 5. Restart the system. 6. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DAQFactory systems from untrusted networks and implement strict firewall rules

Access Control Hardening

all

Restrict user permissions and implement least privilege access to DAQFactory systems

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from production networks
  • Deploy intrusion detection systems and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check DAQFactory version in Help > About menu. If version is 20.7 (Build 2555), the system is vulnerable.

Check Version:

Check Help > About menu in DAQFactory application

Verify Fix Applied:

Verify installed version is newer than 20.7 (Build 2555) and test application functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Memory access violation errors in system logs
  • Unusual process behavior

Network Indicators:

  • Unusual network traffic to DAQFactory ports
  • Connection attempts from unexpected sources

SIEM Query:

source="daqfactory.logs" AND (event_type="crash" OR error_message="memory" OR error_message="access")

🔗 References

📤 Share & Export