The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Designer User) to embed OLE objects into graphics, and escalate their privileges to the identity of a victim user who subsequently interacts with the graphical elements.
https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01
https://www.aveva.com/en/support-and-success/cyber-security-updates/
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-015-01.json
Published: 2026-01-16
Updated: 2026-01-16
Base Score: 5.9
Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:N
Severity: Medium
Base Score: 7.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Severity: High
Base Score: 8.5
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H
Severity: High