{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-44019","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2025-04-21T19:39:54.994Z","datePublished":"2025-06-12T19:51:56.663Z","dateUpdated":"2025-06-12T20:06:50.361Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PI Data Archive","vendor":"AVEVA","versions":[{"lessThanOrEqual":"2018 SP3 Patch 4","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"PI Data Archive","vendor":"AVEVA","versions":[{"status":"affected","version":"2023"}]},{"defaultStatus":"unaffected","product":"PI Data Archive","vendor":"AVEVA","versions":[{"status":"affected","version":"2023 Patch 1"}]},{"defaultStatus":"unaffected","product":"PI Server","vendor":"AVEVA","versions":[{"lessThanOrEqual":"2018 SP3 Patch 6","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"PI Server","vendor":"AVEVA","versions":[{"status":"affected","version":"2023"}]},{"defaultStatus":"unaffected","product":"PI Server","vendor":"AVEVA","versions":[{"status":"affected","version":"2023 Patch 1"}]}],"credits":[{"lang":"en","type":"finder","value":"AVEVA reported these vulnerabilities to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."}],"value":"AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-248","description":"CWE-248","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-06-12T19:59:08.542Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-07"},{"url":"https://www.aveva.com/en/support-and-success/cyber-security-updates/"},{"url":"https://my.osisoft.com/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.</p><p>All affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From <a target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\">OSISoft Customer Portal</a>, search for \"AVEVA PI Server\" and select version 2024 or higher.</p><p>PI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From <a target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\">OSISoft Customer Portal</a>, search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.</p><p>For additional information please refer to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\">AVEVA-2025-001</a>.\n\n<br></p>"}],"value":"AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select version 2024 or higher.\n\nPI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."}],"source":{"advisory":"ICSA-25-162-07","discovery":"INTERNAL"},"title":"AVEVA PI Data Archive Uncaught Exception","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.&nbsp;</p><p>AVEVA further recommends users follow general defensive measures:</p>\n<ul>\n<li>Monitor liveness of PI Network Manager and PI Archive Subsystem services.</li>\n<li>Set the PI Network Manager and PI Archive Subsystem services to automatically restart.</li>\n<li>Limit Port 5450 access to trusted workstations and software.</li>\n<li>For a list of PI System firewall port requirements, see knowledge base article <a target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB01162\">KB01162 - Firewall Port Requirements</a>.</li></ul><li>Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization's architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.</li>\n<li>For a starting point on PI System security best practices, see knowledge base article <a target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833\">KB00833 - Seven best practices for securing your PI Server</a>.\n<p></p><p>For additional information please refer to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\">AVEVA-2025-001</a>.\n\n</p>\n\n</li><li><br></li>"}],"value":"AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit. \n\nAVEVA further recommends users follow general defensive measures:\n\n\n\n  *  Monitor liveness of PI Network Manager and PI Archive Subsystem services.\n\n  *  Set the PI Network Manager and PI Archive Subsystem services to automatically restart.\n\n  *  Limit Port 5450 access to trusted workstations and software.\n\n  *  For a list of PI System firewall port requirements, see knowledge base article  KB01162 - Firewall Port Requirements https://customers.osisoft.com/s/knowledgearticle .\n\n\n  *  Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization's architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\n\n  *  For a starting point on PI System security best practices, see knowledge base article  KB00833 - Seven best practices for securing your PI Server https://customers.osisoft.com/s/knowledgearticle .\n\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .\n\n\n\n\n\n\n  *"}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-12T20:06:34.741269Z","id":"CVE-2025-44019","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-12T20:06:50.361Z"}}]}}