AVEVA PI Server 2018 SP3 Patch 7 - Release Notes
- Last UpdatedMay 30, 2025
- 4 minute read
- PI System
- PI Server 2018
- PI Server
Overview
AVEVA™ PI Server 2018 SP3 Patch 7 includes only updates to the following PI Server components:
-
Data Archive 2018 SP3 Patch 5
-
PI Server 2018 installer kit and distribution kit files (Data Archive only)
Additionally, the Microsoft .NET 4.8 Framework has been removed from the PI Server installer kit. If .NET 4.8 is not installed, you will be prompted to install this software during installation. Refer to the Customer Portal Products page for previous versions of PI Server 2018 SP3 release notes.
There are no new features in this release. For more information on system requirements, installation, and uninstall instructions, see these topics:
Fixes and enhancements
The table lists all resolved issues in this release.
|
Product / component |
Bug |
Description |
|---|---|---|
|
Data Archive |
70679 |
Resolved: The backup process now successfully completes even when the archive subsystem is busy due to the new option to increase the timeout period. |
|
Data Archive |
77023 |
Resolved: The 'getarceventPoints' RPC call now adheres to the configured 'Archive_MaxQueryExecutionSec' timeout setting, eliminating queries running longer than expected. |
|
Data Archive |
79880 |
Resolved: Reprocessing a single MMQ (Memory Mapped Queue) file separately from the entire series now results in consistent outcomes and ensures the process remains responsive. |
|
Data Archive (PI Archive Subsystem) |
67364 |
Resolved: Offline PI Archive Subsystem (piarchss) reprocessing now bypasses the input integrity check when both the '-coercedigitalset' and '-noinputcheck' flags are used. |
|
Data Archive (PI Archive Subsystem) |
94714 |
Resolved: The primary archive no longer becomes corrupted and shows the error: [-16300] Invalid backwards chaining of overflow record. |
|
Data Archive (PI Archive Subsystem) |
111944 |
Resolved: The archive subsystem now reliably flushes data points that use the recno reference from points that were previously deleted, ensuring data consistency and preventing data loss. |
|
Data Archive (PI Update Manager) |
8543 |
Resolved: The configuration setting 'PIUPD_MaxConsTimeout' is now correctly set, ensuring that consumers remain connected and are not removed every two minutes. |
|
Data Archive (PI Archive Subsystem) |
76996 |
Resolved: The archive shift now successfully handles the creation of new PI points beyond the initial primary region size, preventing the error: [-11053] No more available records in this archive and ensuring adequate archive space. |
|
Data Archive (PI Archive Subsystem) |
111469 |
Resolved: The PI Archive Subsystem no longer experiences operations hanging due to lock inconsistency issues encountered while backfilling to non-primary archives. |
|
Data Archive (PI Archive Subsystem) |
111821 |
Resolved: The PI Archive Subsystem no longer writes data to incorrect tags when there is a high volume of tag deletions, tag creations, and event writes to both deleted and newly created tags within a short time span. |
Upgrade compatibility considerations
Refer to the Customer Portal Products page for a complete list of known issues found in previous versions of PI Server 2018 SP3.
Security information and guidance
We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.
We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.
Vulnerabilities fixed
The following table lists the number of fixed vulnerabilities in this release by severity category and CVSS base score range.
|
Severity category |
CVSS base score range |
Number of fixed vulnerabilities |
|---|---|---|
|
Critical |
9.0 - 10 |
0 |
|
High |
7.0 - 8.9 |
1 |
|
Medium |
4.0 - 6.9 |
0 |
|
Low |
0 - 3.9 |
0 |
Vulnerabilities mitigated
The following table provides details on the specific vulnerabilities mitigated in this release, along with the corresponding component, version, CVE or reference, CVSS score, and the mitigation applied.
|
Component |
Version |
CVE or Reference |
CVSS |
Mitigation statement |
|---|---|---|---|---|
|
SQLite |
3.43.0 |
CVE-2023-7104 |
7.4 |
Vulnerable code is not in the execution path. The session extension of SQLite is not utilized. |
|
SQLite |
3.43.0 |
CVE-2024-0232 |
6.3 |
Vulnerable code is not in the execution path. JSON parsing capability of SQLite is not utilized. |
|
WiX toolset |
3.11.1, 3.11.2 |
CVE-2024-24810 |
7.8 |
Vulnerable code is not in the execution path. |
|
WiX toolset |
3.11.1, 3.11.2 |
CVE-2024-29187 / BDSA-2024-1021 |
6.8 |
Customer can mitigate this by restricting write access to the C:\Windows\Temp folder to accounts with elevated privileges, prior to invoking the wix-based installer. AVEVA plans to update this component in a future release. |
|
WiX toolset |
3.11.1, 3.11.2 |
CVE-2019-16511 |
5.5 |
Vulnerable code is not in the execution path. |
|
WiX toolset |
3.11.1, 3.11.2 |
CVE-2024-29188 / BDSA-2024-1026 |
6.2 |
Vulnerable code is not in the execution path. |
Distribution kits
The following table provides the list of products included in the distribution kits for this release.
|
Product |
Software version |
|---|---|
|
Microsoft Visual C++ 2015-2022 Redistributables (x86 and x64) |
14.42.34438 |
|
Microsoft VSTO 2010 Runtime |
10.0.60910 |
|
OSIsoft MS VB Runtime Redistributables |
1.0.2 |
|
PI Buffer Subsystem |
4.9.0.37 |
|
PI Network Subsystem |
3.4.450.165 |
|
PI AF Client |
2.10.11.2717 |
|
PI AF Server |
2.10.11.2717 |
|
PI Analysis Service |
2.10.6.195 |
|
PI Notifications Service |
2.10.11.2697 |
|
Data Archive |
3.4.455.51 |
|
PI Software Development Kit (PI SDK) |
1.4.7.620 |
|
PI System Management Tools |
3.6.3.65 |
|
PI Collective Manager |
1.4.3.25 |
|
PowerShell Tools for the PI System |
2.2.2.91 |
|
PI Module Database Builder |
1.3.0.0 |
©2025 AVEVA Group plc and its subsidiaries. All rights reserved.