CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Lifecycle Timeline
3DescriptionNVD
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service. Depending on the timing of the crash, data present in snapshots/write cache may be lost.
AnalysisAI
CVE-2025-44019 is an uncaught exception vulnerability in AVEVA PI Data Archive that allows authenticated users to crash critical subsystems, causing denial of service and potential data loss in write caches. The vulnerability affects AVEVA PI Data Archive products across multiple versions and requires valid credentials to exploit, making it a medium-to-high risk for organizations relying on AVEVA's industrial data infrastructure.
Technical ContextAI
This vulnerability exploits improper exception handling (CWE-248: Uncaught Exception) within AVEVA PI Data Archive subsystems. PI Data Archive is a time-series database platform critical to SCADA and industrial control systems, managing real-time and historical process data. The uncaught exception allows an authenticated attacker to trigger an unhandled error condition that cascades through necessary subsystems, forcing their termination. The root cause stems from insufficient input validation or error boundary handling in subsystem communication logic. PI Data Archive CPE typically follows: cpe:2.3:a:aveva:pi_data_archive:*:*:*:*:*:*:*:* with various version strings. The timing-dependent data loss in snapshots and write caches indicates the vulnerability impacts the in-memory buffering layer responsible for atomically persisting data to disk.
RemediationAI
Patching: Apply AVEVA security patches for PI Data Archive addressing CVE-2025-44019. Consult AVEVA Product Security Advisories and update to patched versions immediately upon release.; priority: Critical Access Control: Restrict PI Data Archive user accounts using principle of least privilege. Audit and remove unnecessary authenticated access, particularly from shared or service accounts. Implement role-based access control (RBAC) if supported.; priority: High Network Segmentation: Isolate PI Data Archive servers within DMZ or industrial network segments. Restrict inbound network access to trusted systems and operator workstations only. Disable unnecessary network interfaces if PI Data Archive supports local-only operation.; priority: High Monitoring & Detection: Enable audit logging for PI Data Archive subsystem crashes and authenticated user activity. Monitor for repeated authentication failures or unusual API calls that may indicate exploitation attempts. Alert on unexpected subsystem restarts.; priority: Medium Backup Strategy: Implement frequent snapshots and backups of PI Data Archive write cache and snapshots to mitigate data loss from subsystem crashes. Test restore procedures regularly.; priority: Medium
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18213