The vulnerability, if exploited, could allow an authenticated miscreant
(with privileges to access publication targets) to retrieve sensitive
information that could then be used to gain additional access to
downstream resources.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25490 The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to access publication targets) to retrieve sensitive information that could then be used to gain additional access to downstream resources.
Fixes

Solution

AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected product versions should apply security updates to mitigate the risk of exploit. * Upgrade to PI Integrator for Business Analytics 2020 R2 SP2 or higher. * From [OSISoft Customer Portal](PI Integrator for Business Analytics), search for "PI Integrator for Business Analytics" and select version 2020 R2 SP2 or higher.


Workaround

Additionally, AVEVA recommends the following general defensive measures: * Audit assigned permissions to ensure that only trusted users are given access rights to publication targets: https://docs.aveva.com/bundle/pi-integrator-for-business-analytics/page/1013185.html * Ensure publication targets of type Text File or HDFS are configured to limit allowed output file extensions and limit output folders to be logically isolated from critical system components or executable paths: * https://docs.aveva.com/bundle/pi-integrator-for-business-analytics/page/1023019.html https://learn.microsoft.com/en-us/intune/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager

History

Fri, 22 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to access publication targets) to retrieve sensitive information that could then be used to gain additional access to downstream resources.
Title AVEVA PI Integrator Insertion of Sensitive Information into Sent Data
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-21T20:13:40.413Z

Reserved: 2025-07-31T16:41:30.376Z

Link: CVE-2025-41415

cve-icon Vulnrichment

Updated: 2025-08-21T20:13:36.367Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T20:15:33.053

Modified: 2025-08-22T18:08:51.663

Link: CVE-2025-41415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.