Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Adapter for RDBMS

AVEVA Adapter for RDBMS Module 1​.1 release notes

AVEVA Adapter for RDBMS Module 1​.1 release notes

  • Last UpdatedNov 04, 2025
  • 3 minute read

AVEVA Adapter for RDBMS Module: 1.1
AVEVA Adapter for RDBMS: 1.1.0.337
Adapter Framework: 1.8.3.128
Edge Module Manager: 1.2.0.81
Alpine Linux: 3.20.6

AVEVA Adapter for RDBMS, released November 2025, is a containerized version of the adapter that can be deployed using Edge Management on CONNECT. It offers most of the capabilities as the adapter that is available for installation directly on the device.

For more information on product features and functions, refer to the following sections:

  • Prerequisites and system requirements

  • Installation/uninstallation instructions

refer to AVEVA Adapter for RDBMS.

The latest information about the 1.1 release is available online on the AVEVA Documentation Portal.

New features and enhancements

The following items were added in this release:

  • Support for processing client-side failover and server-side failover .

  • Support for Unit of Measurement (UoM) discovery in Discovery Queries.

  • Improvements to discovery queries to support valueColumns, enabling Unit of Measure in discovery.

  • WiX Toolset upgraded to version 5 for Windows Installer.

Resolved issues

This section lists items that were resolved in this release:

Work Items

Description

3076716

Container messages are not sent in history recovery.

3083201

Data Collection may not start or may be delayed in time zones with a positive UTC offset.

3086208

Device Status is incorrect when posting an invalid connection string after a valid one.

3103696

Discovery is not performed as impersonated user credentials.

3359574

KeyNotFoundException displayed when running scheduleId with multiple queries.

3814015

On-Demand history recovery incorrectly interprets the endtime, resulting in a larger interval than expected.

3814039

The RequestInterval endtime is used for the final interval ?ET? query parameter rather than the history recovery endtime.

Known issues

There are no known issues for this release.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

Overview of new vulnerabilities - Fixed or Mitigated

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for RDBMS security vulnerabilities that are fixed in this release.

For this release of AVEVA Adapter for RDBMS, the following vulnerabilities have been fixed or mitigated.

Security vulnerabilities fixed in AVEVA Adapter for RDBMS 1.1 release

Severity Category

CVSS Base Score Range

Number of Fixed Vulnerabilities

Critical

9 - 10

0

High

7.0 - 8.9

0

Medium

4.0 - 6.9

0

Low

0 - 3.9

0

Vulnerability mitigations in AVEVA Adapter for RDBMS 1.1 release

Component

Version

CVE or Reference

CVSS

Mitigation

BusyBox

1.36.1

CVE-2022-28391

8.8

Vulnerable code is not in execution path.

BusyBox

1.36.1

CVE-2023-39810

7.8

Vulnerable code is not in execution path.

BusyBox

1.36.1

CVE-2025-46394

3.3

Vulnerable code is not in execution path.

BusyBox

1.36.1

CVE-2024-58251

2.2

Vulnerable code is not in execution path.

dotnet/runtime

8.0.11

CVE-2025-21176

8.8

Vulnerable code is not in execution path.

dotnet/runtime

8.0.11

CVE-2025-21172

7.5

Vulnerable code is not in execution path.

dotnet/runtime

8.0.11

CVE-2025-30399

6.5

Vulnerable code is not in execution path.

ICU for C/C++ (ICU4C)

74.2

CVE-2025-5222

6.1

Vulnerable code is not in execution path.

musl

1.2.5

CVE-2025-26519

7.1

Vulnerable code is not present.

OpenSSL

3.3.3

CVE-2025-9230

7.1

Vulnerable code is not in execution path.

OpenSSL

3.3.3

CVE-2025-9231

5.7

Vulnerable code is not in execution path.

OpenSSL

3.3.3

CVE-2025-9232

5.2

Vulnerable code is not in execution path.

OpenSSL

3.3.3

CVE-2025-27587

4.0

Vulnerable code is not in execution path.

In This Topic
Related Links
TitleResults for “How to create a CRG?”Also Available in