Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66585: CWE-416 Use After Free in AzeoTech DAQFactory

0
High
VulnerabilityCVE-2025-66585cvecve-2025-66585cwe-416
Published: Thu Dec 11 2025 (12/11/2025, 20:56:16 UTC)
Source: CVE Database V5
Vendor/Project: AzeoTech
Product: DAQFactory

Description

In AzeoTech DAQFactory release 20.7 (Build 2555), a Use After Free vulnerability can be exploited to cause memory corruption while parsing specially crafted .ctl files. This could allow an attacker to execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:00:41 UTC

Technical Analysis

CVE-2025-66585 is a Use After Free vulnerability classified under CWE-416 found in AzeoTech DAQFactory release 20.7 (Build 2555). The flaw occurs during the parsing of .ctl files, which are configuration or control files used by DAQFactory for data acquisition and automation tasks. When a specially crafted .ctl file is processed, the software improperly manages memory, freeing an object prematurely and subsequently accessing it. This leads to memory corruption, which an attacker can leverage to execute arbitrary code within the context of the DAQFactory process. The vulnerability requires local access with user interaction, indicating that an attacker must trick a user into opening or processing a malicious .ctl file. The CVSS 4.0 vector indicates low attack vector (local), high attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the potential for code execution makes this a serious threat. DAQFactory is commonly used in industrial control systems and data acquisition environments, making this vulnerability particularly relevant to operational technology sectors. The absence of available patches at the time of publication increases the urgency for mitigation through alternative controls.

Potential Impact

The vulnerability allows an attacker to execute arbitrary code within the DAQFactory process, potentially compromising the confidentiality, integrity, and availability of data acquisition and control systems. For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, exploitation could lead to unauthorized control of industrial processes, data manipulation, or disruption of operations. This could result in operational downtime, safety hazards, intellectual property theft, and regulatory non-compliance. Given DAQFactory’s role in monitoring and controlling physical processes, successful exploitation could have cascading effects on supply chains and critical services. The requirement for local access and user interaction somewhat limits the attack surface but does not eliminate risk, particularly in environments where users handle .ctl files regularly or where insider threats exist.

Mitigation Recommendations

1. Immediately restrict access to DAQFactory .ctl files to trusted users only and monitor file transfers involving these files. 2. Implement strict application whitelisting to prevent execution of unauthorized or suspicious files within environments running DAQFactory. 3. Employ memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to reduce exploitation success. 4. Educate users on the risks of opening untrusted .ctl files and enforce policies to avoid processing files from unknown sources. 5. Monitor DAQFactory process behavior for anomalies indicative of exploitation attempts, including unexpected memory usage or crashes. 6. Coordinate with AzeoTech for timely patch deployment once available and test patches in controlled environments before production rollout. 7. Use network segmentation to isolate DAQFactory systems from general IT networks to limit lateral movement in case of compromise. 8. Maintain up-to-date backups of configuration files and system states to enable recovery from potential attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-04T21:11:02.201Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b336622246175c6a2b866

Added to database: 12/11/2025, 9:11:02 PM

Last enriched: 12/31/2025, 12:00:41 AM

Last updated: 2/7/2026, 7:58:58 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats