Description
The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.
Published: 2026-02-10
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability enables an attacker who holds Event Log Reader privileges to extract proxy connection details, including URLs and credentials, from PI to CONNECT Agent event log files. This exposure of authentication information in logs allows the attacker to gain unauthorized access to the proxy service. Based on the description, it is inferred that this unauthorized access could provide a pathway for further lateral movement or data exfiltration. The flaw is an instance of information disclosure through log files (CWE-532) and does not provide direct code execution or denial‑of‑service capabilities.

Affected Systems

The affected product is AVEVA PI to CONNECT Agent. All versions prior to v2.5.2790 are vulnerable and can be remediated by upgrading to the latest agent release, available from the CONNECT Data Services Portal.

Risk and Exploitability

The CVSS score of 5.7 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local or compromised Event Log Reader rights (S-1-5-32-573), implying that an internal threat actor or attacker who has obtained such privileges could leverage the exposed proxy credentials. Because the attack vector is limited to users with log‑reading access, the risk is relatively contained compared to remote code execution vulnerabilities.

Generated by OpenCVE AI on April 18, 2026 at 18:11 UTC.

Remediation

Vendor Solution

AVEVA recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.  * Users of affected product versions should apply security updates to mitigate the risk of proxy details exposure in newly generated PI to CONNECT Agent event logs.  * Users who have used affected product versions, should review existing PI to CONNECT Agent event logs (live/backups/copies) for exposed proxy connection details and consider purging the sensitive data from logs and/or configuring new credentials for access to the proxy service. The following general defensive measures are recommended:  * Remove use of plain text passwords in proxy URLs. Alternatively, if passwords are required by the proxy, then use least-privilege credentials.  * Ensure only trusted users are given Event Log Reader (S-1-5-32-573) privileges on hosts where PI to CONNECT is installed.  * Review existing PI to CONNECT event logs (live/backups/copies) for exposed proxy connection details and consider purging the sensitive data from logs and/or configuring new credentials for access to the proxy service. All affected versions can be fixed by upgrading to PI to CONNECT Agent v2.5.2790 or higher. The latest version of the agent can be downloaded from the CONNECT Data Services Portal here: [ https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2026-003.pdf .


OpenCVE Recommended Actions

  • Upgrade to PI to CONNECT Agent v2.5.2790 or newer to eliminate the log injection issue
  • Audit existing PI to CONNECT event logs—including live, backup, and archival copies—and purge any exposed proxy credentials or URLs
  • Replace plain‑text proxy passwords with least‑privilege credentials or remove them from configuration entirely
  • Restrict Event Log Reader (S-1-5-32-573) privileges to trusted administrative accounts only

Generated by OpenCVE AI on April 18, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Aveva
Aveva pi To Connect Agent
Vendors & Products Aveva
Aveva pi To Connect Agent

Tue, 10 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.
Title Insertion of Sensitive Information into Log File vulnerability in AVEVA PI to CONNECT Agent
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}

cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:L'}


Subscriptions

Aveva Pi To Connect Agent
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-12T18:46:41.102Z

Reserved: 2026-01-27T15:52:30.419Z

Link: CVE-2026-1495

cve-icon Vulnrichment

Updated: 2026-02-12T18:46:37.796Z

cve-icon NVD

Status : Deferred

Published: 2026-02-10T21:16:01.470

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses