CVE-2025-9317

8.4 HIGH

📋 TL;DR

This vulnerability allows attackers with read access to Edge Project or Edge Offline Cache files to extract weakly hashed passwords and brute-force them offline. Affects AVEVA Edge software users storing app-native or Active Directory credentials. The weak hashing makes password recovery computationally feasible.

💻 Affected Systems

Products:
  • AVEVA Edge
Versions: All versions prior to 2024
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have read access to specific project or cache files containing password hashes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain domain administrator credentials, leading to full network compromise and lateral movement across enterprise systems.

🟠

Likely Case

Local attackers or malware with file access steal credentials for privilege escalation or persistence within affected systems.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems without credential reuse.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file system access but uses standard brute-force techniques against weak hashes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AVEVA Edge 2024

Vendor Advisory: https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2025-006.pdf

Restart Required: Yes

Instructions:

1. Download AVEVA Edge 2024 from official vendor portal. 2. Backup existing projects. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict File Access

windows

Apply strict file permissions to Edge project and cache directories to prevent unauthorized read access.

icacls "C:\ProgramData\AVEVA\Edge\Projects" /deny "Users":(R)
icacls "C:\Users\%USERNAME%\AppData\Local\AVEVA\Edge\Cache" /deny "Users":(R)

🧯 If You Can't Patch

  • Implement network segmentation to isolate AVEVA Edge systems from critical infrastructure.
  • Deploy endpoint detection and response (EDR) to monitor for unauthorized file access attempts.

🔍 How to Verify

Check if Vulnerable:

Check AVEVA Edge version via Help > About. Versions prior to 2024 are vulnerable.

Check Version:

Not applicable - check through application GUI

Verify Fix Applied:

Confirm version shows 2024 or later in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to Edge project/cache directories
  • Multiple failed authentication attempts following file access events

Network Indicators:

  • Lateral movement attempts from AVEVA Edge systems
  • Unexpected authentication requests to domain controllers

SIEM Query:

source="windows_security" EventCode=4663 ObjectName="*AVEVA*Edge*" AccessMask="0x1" | stats count by AccountName, ObjectName

🔗 References

📤 Share & Export