Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-3052 (GCVE-0-2025-3052)
Vulnerability from cvelistv5
Published
2025-06-10 19:19
Modified
2025-06-10 21:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | DT Research | BiosFlashShell |
Version: 80.02 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-3052", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-10T19:51:42.494987Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-10T19:53:46.010Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-06-10T21:03:04.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.kb.cert.org/vuls/id/806555" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BiosFlashShell", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "80.02" } ] }, { "product": "BiosFlashShell", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "81.02" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.17" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.18" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.19" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.20" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.21" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "70.22" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.17" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.18" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.19" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.20" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.21" } ] }, { "product": "Dtbios", "vendor": "DT Research", "versions": [ { "status": "affected", "version": "71.22" } ] } ], "descriptions": [ { "lang": "en", "value": "An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-123: Write-what-where Condition", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-10T19:19:54.775Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "url": "https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html" }, { "url": "https://www.binarly.io/advisories/brly-dva-2025-001" } ], "source": { "discovery": "EXTERNAL" }, "title": "An arbitrary write vulnerability in Microsoft signed UEFI firmware from DT Research Inc.", "x_generator": { "engine": "VINCE 3.0.19", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-3052" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2025-3052", "datePublished": "2025-06-10T19:19:54.775Z", "dateReserved": "2025-03-31T16:26:00.858Z", "dateUpdated": "2025-06-10T21:03:04.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-3052\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2025-06-10T20:15:23.037\",\"lastModified\":\"2025-06-12T16:06:29.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de escritura arbitraria en el firmware UEFI firmado por Microsoft permite la ejecuci\u00f3n de c\u00f3digo de software no confiable. Esto permite a un atacante controlar su valor, lo que provoca escrituras arbitrarias en memoria, incluyendo la modificaci\u00f3n de configuraciones cr\u00edticas del firmware almacenadas en la NVRAM. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda permitir eludir la seguridad, mecanismos de persistencia o comprometer completamente el sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"references\":[{\"url\":\"https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.binarly.io/advisories/brly-dva-2025-001\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/806555\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.kb.cert.org/vuls/id/806555\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-06-10T21:03:04.250Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3052\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-10T19:51:42.494987Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-10T19:52:07.883Z\"}}], \"cna\": {\"title\": \"An arbitrary write vulnerability in Microsoft signed UEFI firmware from DT Research Inc.\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"affected\": [{\"vendor\": \"DT Research\", \"product\": \"BiosFlashShell\", \"versions\": [{\"status\": \"affected\", \"version\": \"80.02\"}]}, {\"vendor\": \"DT Research\", \"product\": \"BiosFlashShell\", \"versions\": [{\"status\": \"affected\", \"version\": \"81.02\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.17\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.18\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.19\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.20\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.21\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"70.22\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.17\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.18\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.19\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.20\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.21\"}]}, {\"vendor\": \"DT Research\", \"product\": \"Dtbios\", \"versions\": [{\"status\": \"affected\", \"version\": \"71.22\"}]}], \"references\": [{\"url\": \"https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html\"}, {\"url\": \"https://www.binarly.io/advisories/brly-dva-2025-001\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 3.0.19\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2025-3052\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-123: Write-what-where Condition\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2025-06-10T19:19:54.775Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-3052\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-10T21:03:04.250Z\", \"dateReserved\": \"2025-03-31T16:26:00.858Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2025-06-10T19:19:54.775Z\", \"assignerShortName\": \"certcc\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2025-1277
Vulnerability from csaf_certbund
Published
2025-06-10 22:00
Modified
2025-08-12 22:00
Summary
Microsoft Windows: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Windows ist ein Betriebssystem von Microsoft.
Angriff
Ein Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erhöhen, um einen Denial of Service Angriff durchzuführen, um beliebigen Programmcode auszuführen, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um falsche Informationen darzustellen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Windows ist ein Betriebssystem von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erh\u00f6hen, um einen Denial of Service Angriff durchzuf\u00fchren, um beliebigen Programmcode auszuf\u00fchren, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um falsche Informationen darzustellen.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1277 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1277.json" }, { "category": "self", "summary": "WID-SEC-2025-1277 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1277" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates", "url": "https://msrc.microsoft.com/update-guide/" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2025-307 vom 2025-07-24", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2025/06.html" }, { "category": "external", "summary": "PoC CVE-2025-32724", "url": "https://github.com/SafeBreach-Labs/Win-DoS" }, { "category": "external", "summary": "Insyde Security Advisory INSYDE-SA-2025006 vom 2025-08-12", "url": "https://www.insyde.com/security-pledge/sa-2025006/" } ], "source_lang": "en-US", "title": "Microsoft Windows: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-12T22:00:00.000+00:00", "generator": { "date": "2025-08-13T06:22:21.716+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1277", "initial_release_date": "2025-06-10T22:00:00.000+00:00", "revision_history": [ { "date": "2025-06-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "3", "summary": "PoC aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Insyde aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Storage", "product": { "name": "Hitachi Storage", "product_id": "T009295", "product_identification_helper": { "cpe": "cpe:/h:hitachi:storage:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Insyde UEFI Firmware", "product": { "name": "Insyde UEFI Firmware", "product_id": "T033442", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:-" } } } ], "category": "vendor", "name": "Insyde" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Security App", "product": { "name": "Microsoft Windows Security App", "product_id": "T021063", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:update_assistant" } } }, { "category": "product_version", "name": "Remote Desktop client for Desktop", "product": { "name": "Microsoft Windows Remote Desktop client for Desktop", "product_id": "T042605", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:remote_desktop_client_for_desktop" } } }, { "category": "product_version", "name": "App Client for Desktop", "product": { "name": "Microsoft Windows App Client for Desktop", "product_id": "T042613", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:app_client_for_desktop" } } } ], "category": "product_name", "name": "Windows" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows 10", "product": { "name": "Microsoft Windows 10", "product_id": "T042599", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:-" } } }, { "category": "product_version", "name": "Version 1607", "product": { "name": "Microsoft Windows 10 Version 1607", "product_id": "T042601", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1607" } } }, { "category": "product_version", "name": "Version 1809", "product": { "name": "Microsoft Windows 10 Version 1809", "product_id": "T042602", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1809" } } }, { "category": "product_version", "name": "Version 21H2", "product": { "name": "Microsoft Windows 10 Version 21H2", "product_id": "T042606", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_21h2" } } }, { "category": "product_version", "name": "Version 22H2", "product": { "name": "Microsoft Windows 10 Version 22H2", "product_id": "T042608", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_22h2" } } } ], "category": "product_name", "name": "Windows 10" }, { "branches": [ { "category": "product_version", "name": "Version 22H2", "product": { "name": "Microsoft Windows 11 Version 22H2", "product_id": "T042607", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_22h2" } } }, { "category": "product_version", "name": "Version 23H2", "product": { "name": "Microsoft Windows 11 Version 23H2", "product_id": "T042609", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_23h2" } } }, { "category": "product_version", "name": "Version 24H2", "product": { "name": "Microsoft Windows 11 Version 24H2", "product_id": "T042611", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_24h2" } } } ], "category": "product_name", "name": "Windows 11" }, { "branches": [ { "category": "product_version", "name": "2008 SP2", "product": { "name": "Microsoft Windows Server 2008 SP2", "product_id": "T042596", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server:2008_sp2" } } }, { "category": "product_version", "name": "2008 R2 SP1", "product": { "name": "Microsoft Windows Server 2008 R2 SP1", "product_id": "T043719", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1" } } } ], "category": "product_name", "name": "Windows Server" }, { "category": "product_name", "name": "Microsoft Windows Server 2012", "product": { "name": "Microsoft Windows Server 2012", "product_id": "T043730", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012 R2", "product": { "name": "Microsoft Windows Server 2012 R2", "product_id": "T043731", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012_r2:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2016", "product": { "name": "Microsoft Windows Server 2016", "product_id": "T042600", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2016:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2019", "product": { "name": "Microsoft Windows Server 2019", "product_id": "T042603", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2019:-" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows Server 2022", "product": { "name": "Microsoft Windows Server 2022", "product_id": "T041082", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:-" } } }, { "category": "product_version", "name": "23H2 Edition", "product": { "name": "Microsoft Windows Server 2022 23H2 Edition", "product_id": "T042610", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition" } } } ], "category": "product_name", "name": "Windows Server 2022" }, { "category": "product_name", "name": "Microsoft Windows Server 2025", "product": { "name": "Microsoft Windows Server 2025", "product_id": "T044507", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2025:-" } } } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-32712", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32712" }, { "cve": "CVE-2025-32713", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32713" }, { "cve": "CVE-2025-32714", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32714" }, { "cve": "CVE-2025-32716", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32716" }, { "cve": "CVE-2025-32718", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32718" }, { "cve": "CVE-2025-32721", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32721" }, { "cve": "CVE-2025-33067", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33067" }, { "cve": "CVE-2025-33070", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33070" }, { "cve": "CVE-2025-33073", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33073" }, { "cve": "CVE-2025-33075", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33075" }, { "cve": "CVE-2025-47955", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-47955" }, { "cve": "CVE-2025-32724", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32724" }, { "cve": "CVE-2025-32725", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32725" }, { "cve": "CVE-2025-33050", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33050" }, { "cve": "CVE-2025-33056", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33056" }, { "cve": "CVE-2025-33057", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33057" }, { "cve": "CVE-2025-33068", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33068" }, { "cve": "CVE-2025-29828", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-29828" }, { "cve": "CVE-2025-32710", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32710" }, { "cve": "CVE-2025-33053", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33053" }, { "cve": "CVE-2025-33064", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33064" }, { "cve": "CVE-2025-33066", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33066" }, { "cve": "CVE-2025-33071", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33071" }, { "cve": "CVE-2025-24065", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-24065" }, { "cve": "CVE-2025-24068", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-24068" }, { "cve": "CVE-2025-24069", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-24069" }, { "cve": "CVE-2025-32715", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32715" }, { "cve": "CVE-2025-32719", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32719" }, { "cve": "CVE-2025-32720", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32720" }, { "cve": "CVE-2025-32722", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-32722" }, { "cve": "CVE-2025-33052", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33052" }, { "cve": "CVE-2025-33055", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33055" }, { "cve": "CVE-2025-33058", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33058" }, { "cve": "CVE-2025-33059", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33059" }, { "cve": "CVE-2025-33060", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33060" }, { "cve": "CVE-2025-33061", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33061" }, { "cve": "CVE-2025-33062", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33062" }, { "cve": "CVE-2025-33063", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33063" }, { "cve": "CVE-2025-33065", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33065" }, { "cve": "CVE-2025-47969", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-47969" }, { "cve": "CVE-2025-3052", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-3052" }, { "cve": "CVE-2025-33069", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-33069" }, { "cve": "CVE-2025-47160", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-47160" }, { "cve": "CVE-2025-47956", "product_status": { "known_affected": [ "T042605", "T044507", "T042606", "T042607", "T033442", "T042608", "T043719", "T042609", "T042596", "T043730", "T043731", "T042599", "T042610", "T042600", "T042611", "T042601", "T041082", "T042602", "T042613", "T042603", "T021063", "T009295" ] }, "release_date": "2025-06-10T22:00:00.000+00:00", "title": "CVE-2025-47956" } ] }
ghsa-q4rv-v64c-3hff
Vulnerability from github
Published
2025-06-10 21:31
Modified
2025-06-10 21:31
Severity ?
VLAI Severity ?
Details
An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.
{ "affected": [], "aliases": [ "CVE-2025-3052" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-06-10T20:15:23Z", "severity": "HIGH" }, "details": "An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.", "id": "GHSA-q4rv-v64c-3hff", "modified": "2025-06-10T21:31:23Z", "published": "2025-06-10T21:31:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3052" }, { "type": "WEB", "url": "https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html" }, { "type": "WEB", "url": "https://www.binarly.io/advisories/brly-dva-2025-001" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/806555" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
ncsc-2025-0188
Vulnerability from csaf_ncscnl
Published
2025-06-10 18:43
Modified
2025-06-10 18:43
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial of Service (DoS)
- Omzeilen van een beveiligingsmaatregel
- Uitvoeren van willekeurige code (Gebruikersrechten)
- Uitvoeren van willekeurige code (Root/Adminrechten)
- Toegang tot gevoelige gegevens
- Verkrijgen van verhoogde rechten
- Spoofing
```
Windows Recovery Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32721 | 7.30 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Security App:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-47956 | 5.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
App Control for Business (WDAC):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33069 | 5.10 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Remote Desktop Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32710 | 8.10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Storage Management Provider:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32719 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-32720 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33058 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33059 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33060 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33061 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33062 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33063 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33065 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-24068 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-24069 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-24065 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2025-33055 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Local Security Authority Subsystem Service (LSASS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32724 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows KDC Proxy Service (KPSSVC):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33071 | 8.10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Remote Access Connection Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-47955 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Remote Desktop Client:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32715 | 6.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Storage Port Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32722 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Installer:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32714 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-33075 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Hello:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-47969 | 4.40 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
WebDAV:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33053 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Standards-Based Storage Management Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33068 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29828 | 8.10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32712 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Routing and Remote Access Service (RRAS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33064 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2025-33066 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33067 | 8.40 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-3052 | 6.70 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Media:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32716 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Netlogon:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33070 | 8.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows SMB:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32718 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-33073 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Common Log File System Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32713 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Local Security Authority (LSA):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33057 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Microsoft Local Security Authority Server (lsasrv):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33056 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows DHCP Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-32725 | 7.50 | Denial-of-Service |
| CVE-2025-33050 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows DWM Core Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-33052 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Shell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-47160 | 5.40 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Kans
medium
Schade
high
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-822
Untrusted Pointer Dereference
CWE-126
Buffer Over-read
CWE-347
Improper Verification of Cryptographic Signature
CWE-908
Use of Uninitialized Resource
CWE-190
Integer Overflow or Wraparound
CWE-693
Protection Mechanism Failure
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-284
Improper Access Control
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-400
Uncontrolled Resource Consumption
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-73
External Control of File Name or Path
CWE-269
Improper Privilege Management
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial of Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoeren van willekeurige code (Gebruikersrechten)\n- Uitvoeren van willekeurige code (Root/Adminrechten)\n- Toegang tot gevoelige gegevens\n- Verkrijgen van verhoogde rechten\n- Spoofing\n\n\n```\nWindows Recovery Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32721 | 7.30 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Security App: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-47956 | 5.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nApp Control for Business (WDAC): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33069 | 5.10 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32710 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Storage Management Provider: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32719 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-32720 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33058 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33059 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33060 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33061 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33062 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33063 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33065 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-24068 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-24069 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-24065 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2025-33055 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority Subsystem Service (LSASS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32724 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows KDC Proxy Service (KPSSVC): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33071 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-47955 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32715 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Storage Port Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32722 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32714 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-33075 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-47969 | 4.40 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWebDAV: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33053 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29828 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32712 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33064 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2025-33066 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33067 | 8.40 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-3052 | 6.70 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32716 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Netlogon: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33070 | 8.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows SMB: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32718 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-33073 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32713 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority (LSA): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33057 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nMicrosoft Local Security Authority Server (lsasrv): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33056 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-32725 | 7.50 | Denial-of-Service | \n| CVE-2025-33050 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-33052 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-47160 | 5.40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2025-06-10T18:43:18.187461Z", "generator": { "date": "2025-06-05T14:45:00Z", "engine": { "name": "V.A.", "version": "1.1" } }, "id": "NCSC-2025-0188", "initial_release_date": "2025-06-10T18:43:18.187461Z", "revision_history": [ { "date": "2025-06-10T18:43:18.187461Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1440176", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*" } } } ], "category": "product_name", "name": "Remote Desktop client for Windows Desktop" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.8148", "product": { "name": "vers:microsoft/10.0.14393.8148", "product_id": "CSAFPID-2906570", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8148:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1607 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.8148", "product": { "name": "vers:microsoft/10.0.14393.8148", "product_id": "CSAFPID-2906571", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8148:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1607 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7434", "product": { "name": "vers:microsoft/10.0.17763.7434", "product_id": "CSAFPID-2906560", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7434:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1809 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7434", "product": { "name": "vers:microsoft/10.0.17763.7434", "product_id": "CSAFPID-2906561", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7434:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1809 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5965", "product": { "name": "vers:microsoft/10.0.19044.5965", "product_id": "CSAFPID-2906562", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5965:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5965", "product": { "name": "vers:microsoft/10.0.19044.5965", "product_id": "CSAFPID-2906563", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5965:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5965", "product": { "name": "vers:microsoft/10.0.19044.5965", "product_id": "CSAFPID-2906564", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5965:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5965", "product": { "name": "vers:microsoft/10.0.19045.5965", "product_id": "CSAFPID-2906567", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5965:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5965", "product": { "name": "vers:microsoft/10.0.19045.5965", "product_id": "CSAFPID-2906566", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5965:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5965", "product": { "name": "vers:microsoft/10.0.19045.5965", "product_id": "CSAFPID-2906565", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5965:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.10240.21034", "product": { "name": "vers:microsoft/10.0.10240.21034", "product_id": "CSAFPID-2906568", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21034:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.10240.21034", "product": { "name": "vers:microsoft/10.0.10240.21034", "product_id": "CSAFPID-2906569", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21034:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5472", "product": { "name": "vers:microsoft/10.0.22621.5472", "product_id": "CSAFPID-2906546", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5472:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5472", "product": { "name": "vers:microsoft/10.0.22621.5472", "product_id": "CSAFPID-2906547", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5472:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22631.5472", "product": { "name": "vers:microsoft/10.0.22631.5472", "product_id": "CSAFPID-2906549", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5472:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22631.5472", "product": { "name": "vers:microsoft/10.0.22631.5472", "product_id": "CSAFPID-2906550", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5472:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.4349", "product": { "name": "vers:microsoft/10.0.26100.4349", "product_id": "CSAFPID-2906552", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4349:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 24H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.4349", "product": { "name": "vers:microsoft/10.0.26100.4349", "product_id": "CSAFPID-2906553", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4349:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 24H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1440177", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*" } } } ], "category": "product_name", "name": "Windows App Client for Windows Desktop" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-2906572", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Security App" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.8066", "product": { "name": "vers:microsoft/10.0.14393.8066", "product_id": "CSAFPID-2835619", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.8066:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2016" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.8066", "product": { "name": "vers:microsoft/10.0.14393.8066", "product_id": "CSAFPID-2835620", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.8066:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2016 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7314", "product": { "name": "vers:microsoft/10.0.17763.7314", "product_id": "CSAFPID-2835596", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2019" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7314", "product": { "name": "vers:microsoft/10.0.17763.7314", "product_id": "CSAFPID-2835597", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2019 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.20348.3807", "product": { "name": "vers:microsoft/10.0.20348.3807", "product_id": "CSAFPID-2906544", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3807:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.20348.3807", "product": { "name": "vers:microsoft/10.0.20348.3807", "product_id": "CSAFPID-2906545", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3807:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.25398.1665", "product": { "name": "vers:microsoft/10.0.25398.1665", "product_id": "CSAFPID-2906551", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1665:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022, 23H2 Edition (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.4349", "product": { "name": "vers:microsoft/10.0.26100.4349", "product_id": "CSAFPID-2906554", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4349:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2025" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.4349", "product": { "name": "vers:microsoft/10.0.26100.4349", "product_id": "CSAFPID-2906548", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4349:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2025 (Server Core installation)" } ], "category": "product_family", "name": "Windows" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1.2.0.0|\u003c1.2.6278.0", "product": { "name": "vers:unknown/1.2.0.0|\u003c1.2.6278.0", "product_id": "CSAFPID-2906488" } } ], "category": "product_name", "name": "Remote Desktop client for Windows Desktop" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.10240.0|\u003c10.0.10240.21014", "product": { "name": "vers:unknown/10.0.10240.0|\u003c10.0.10240.21014", "product_id": "CSAFPID-2835398" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.10240.0|\u003c10.0.10240.21034", "product": { "name": "vers:unknown/10.0.10240.0|\u003c10.0.10240.21034", "product_id": "CSAFPID-2906409" } } ], "category": "product_name", "name": "Windows 10 Version 1507" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product_id": "CSAFPID-2835399" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product_id": "CSAFPID-2906410" } } ], "category": "product_name", "name": "Windows 10 Version 1607" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product_id": "CSAFPID-2835392" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product_id": "CSAFPID-2906396" } } ], "category": "product_name", "name": "Windows 10 Version 1809" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.19044.0|\u003c10.0.19044.5854", "product": { "name": "vers:unknown/10.0.19044.0|\u003c10.0.19044.5854", "product_id": "CSAFPID-2835393" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.19044.0|\u003c10.0.19044.5965", "product": { "name": "vers:unknown/10.0.19044.0|\u003c10.0.19044.5965", "product_id": "CSAFPID-2906400" } } ], "category": "product_name", "name": "Windows 10 Version 21H2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.5854", "product": { "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.5854", "product_id": "CSAFPID-2835395" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.5965", "product": { "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.5965", "product_id": "CSAFPID-2906402" } } ], "category": "product_name", "name": "Windows 10 Version 22H2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22621.5335", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22621.5335", "product_id": "CSAFPID-2906437" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5335", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5335", "product_id": "CSAFPID-2835397" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5472", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5472", "product_id": "CSAFPID-2906405" } } ], "category": "product_name", "name": "Windows 11 Version 23H2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product_id": "CSAFPID-2835405" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product_id": "CSAFPID-2906407" } } ], "category": "product_name", "name": "Windows 11 Version 24H2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.22621.0|\u003c10.0.22621.5335", "product": { "name": "vers:unknown/10.0.22621.0|\u003c10.0.22621.5335", "product_id": "CSAFPID-2835394" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.22621.0|\u003c10.0.22621.5472", "product": { "name": "vers:unknown/10.0.22621.0|\u003c10.0.22621.5472", "product_id": "CSAFPID-2906401" } } ], "category": "product_name", "name": "Windows 11 version 22H2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22621.5335", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22621.5335", "product_id": "CSAFPID-2906436" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5335", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5335", "product_id": "CSAFPID-2835396" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5472", "product": { "name": "vers:unknown/10.0.22631.0|\u003c10.0.22631.5472", "product_id": "CSAFPID-2906404" } } ], "category": "product_name", "name": "Windows 11 version 22H3" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1.00|\u003c2.0.505.0", "product": { "name": "vers:unknown/1.00|\u003c2.0.505.0", "product_id": "CSAFPID-2906487" } } ], "category": "product_name", "name": "Windows App Client for Windows Desktop" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1000.0.0.0|\u003c1000.27840.0.1000", "product": { "name": "vers:unknown/1000.0.0.0|\u003c1000.27840.0.1000", "product_id": "CSAFPID-2906484" } } ], "category": "product_name", "name": "Windows Security App" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product_id": "CSAFPID-2844067" } }, { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product_id": "CSAFPID-2906419" } } ], "category": "product_name", "name": "Windows Server 2008 Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27729", "product": { "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27729", "product_id": "CSAFPID-2835403" } }, { "category": "product_version_range", "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27769", "product": { "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27769", "product_id": "CSAFPID-2906420" } } ], "category": "product_name", "name": "Windows Server 2008 R2 Service Pack 1" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27729", "product": { "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27729", "product_id": "CSAFPID-2835404" } }, { "category": "product_version_range", "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27769", "product": { "name": "vers:unknown/6.1.7601.0|\u003c6.1.7601.27769", "product_id": "CSAFPID-2906421" } } ], "category": "product_name", "name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.1.7601.27729", "product": { "name": "vers:microsoft/6.1.7601.27729", "product_id": "CSAFPID-2835625", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.1.7601.27729", "product": { "name": "vers:microsoft/6.1.7601.27729", "product_id": "CSAFPID-2835626", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23317", "product": { "name": "vers:microsoft/6.0.6003.23317", "product_id": "CSAFPID-2906556", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23317:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23317", "product": { "name": "vers:microsoft/6.0.6003.23317", "product_id": "CSAFPID-2906557", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23317:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23317", "product": { "name": "vers:microsoft/6.0.6003.23317", "product_id": "CSAFPID-2906558", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23317:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for x64-based Systems Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23317", "product": { "name": "vers:microsoft/6.0.6003.23317", "product_id": "CSAFPID-2906559", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23317:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.2.9200.25475", "product": { "name": "vers:microsoft/6.2.9200.25475", "product_id": "CSAFPID-2835627", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25475:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.2.9200.25475", "product": { "name": "vers:microsoft/6.2.9200.25475", "product_id": "CSAFPID-2835628", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25475:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.3.9600.22577", "product": { "name": "vers:microsoft/6.3.9600.22577", "product_id": "CSAFPID-2835629", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22577:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 R2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.3.9600.22577", "product": { "name": "vers:microsoft/6.3.9600.22577", "product_id": "CSAFPID-2835630", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22577:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 R2 (Server Core installation)" } ], "category": "product_family", "name": "ESU" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product_id": "CSAFPID-2844065" } }, { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product_id": "CSAFPID-2906417" } } ], "category": "product_name", "name": "Windows Server 2008 Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23317", "product_id": "CSAFPID-2844066" } }, { "category": "product_version_range", "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product": { "name": "vers:unknown/6.0.6003.0|\u003c6.0.6003.23351", "product_id": "CSAFPID-2906418" } } ], "category": "product_name", "name": "Windows Server 2008 Service Pack 2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25475", "product": { "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25475", "product_id": "CSAFPID-2835222" } }, { "category": "product_version_range", "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25522", "product": { "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25522", "product_id": "CSAFPID-2906413" } } ], "category": "product_name", "name": "Windows Server 2012" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25475", "product": { "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25475", "product_id": "CSAFPID-2835223" } }, { "category": "product_version_range", "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25522", "product": { "name": "vers:unknown/6.2.9200.0|\u003c6.2.9200.25522", "product_id": "CSAFPID-2906414" } } ], "category": "product_name", "name": "Windows Server 2012 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577", "product": { "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577", "product_id": "CSAFPID-2835224" } }, { "category": "product_version_range", "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22620", "product": { "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22620", "product_id": "CSAFPID-2906415" } } ], "category": "product_name", "name": "Windows Server 2012 R2" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577", "product": { "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577", "product_id": "CSAFPID-2835225" } }, { "category": "product_version_range", "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22620", "product": { "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22620", "product_id": "CSAFPID-2906416" } } ], "category": "product_name", "name": "Windows Server 2012 R2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product_id": "CSAFPID-2835220" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product_id": "CSAFPID-2906411" } } ], "category": "product_name", "name": "Windows Server 2016" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8066", "product_id": "CSAFPID-2835221" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product": { "name": "vers:unknown/10.0.14393.0|\u003c10.0.14393.8148", "product_id": "CSAFPID-2906412" } } ], "category": "product_name", "name": "Windows Server 2016 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product_id": "CSAFPID-2835214" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product_id": "CSAFPID-2906397" } } ], "category": "product_name", "name": "Windows Server 2019" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7314", "product_id": "CSAFPID-2835215" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product": { "name": "vers:unknown/10.0.17763.0|\u003c10.0.17763.7434", "product_id": "CSAFPID-2906398" } } ], "category": "product_name", "name": "Windows Server 2019 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.20348.0|\u003c10.0.20348.3692", "product": { "name": "vers:unknown/10.0.20348.0|\u003c10.0.20348.3692", "product_id": "CSAFPID-2835216" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.20348.0|\u003c10.0.20348.3807", "product": { "name": "vers:unknown/10.0.20348.0|\u003c10.0.20348.3807", "product_id": "CSAFPID-2906399" } } ], "category": "product_name", "name": "Windows Server 2022" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1611", "product": { "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1611", "product_id": "CSAFPID-2835218" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1665", "product": { "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1665", "product_id": "CSAFPID-2906406" } } ], "category": "product_name", "name": "Windows Server 2022, 23H2 Edition (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product_id": "CSAFPID-2835219" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product_id": "CSAFPID-2906408" } } ], "category": "product_name", "name": "Windows Server 2025" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061", "product_id": "CSAFPID-2835217" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product": { "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4349", "product_id": "CSAFPID-2906403" } } ], "category": "product_name", "name": "Windows Server 2025 (Server Core installation)" } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-29828", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29828 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-29828.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-29828" }, { "cve": "CVE-2025-32710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32710 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32710.json" } ], "title": "CVE-2025-32710" }, { "cve": "CVE-2025-32712", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32712 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32712.json" } ], "title": "CVE-2025-32712" }, { "cve": "CVE-2025-32713", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32713 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32713.json" } ], "title": "CVE-2025-32713" }, { "cve": "CVE-2025-32714", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32714 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32714.json" } ], "title": "CVE-2025-32714" }, { "cve": "CVE-2025-32715", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32715 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32715.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-32715" }, { "cve": "CVE-2025-32716", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32716 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32716.json" } ], "title": "CVE-2025-32716" }, { "cve": "CVE-2025-32718", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32718 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32718.json" } ], "title": "CVE-2025-32718" }, { "cve": "CVE-2025-32719", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32719 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32719.json" } ], "title": "CVE-2025-32719" }, { "cve": "CVE-2025-32720", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32720 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32720.json" } ], "title": "CVE-2025-32720" }, { "cve": "CVE-2025-32721", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32721 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32721.json" } ], "title": "CVE-2025-32721" }, { "cve": "CVE-2025-32722", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32722 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32722.json" } ], "title": "CVE-2025-32722" }, { "cve": "CVE-2025-32724", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32724 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32724.json" } ], "title": "CVE-2025-32724" }, { "cve": "CVE-2025-33058", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33058 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33058" }, { "cve": "CVE-2025-33059", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33059 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33059.json" } ], "title": "CVE-2025-33059" }, { "cve": "CVE-2025-33060", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33060 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33060.json" } ], "title": "CVE-2025-33060" }, { "cve": "CVE-2025-33061", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33061 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33061.json" } ], "title": "CVE-2025-33061" }, { "cve": "CVE-2025-33062", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33062 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33062.json" } ], "title": "CVE-2025-33062" }, { "cve": "CVE-2025-33063", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33063 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33063.json" } ], "title": "CVE-2025-33063" }, { "cve": "CVE-2025-33064", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33064 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33064.json" } ], "title": "CVE-2025-33064" }, { "cve": "CVE-2025-33065", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33065 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33065.json" } ], "title": "CVE-2025-33065" }, { "cve": "CVE-2025-33066", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33066 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33066.json" } ], "title": "CVE-2025-33066" }, { "cve": "CVE-2025-33067", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33067 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33067.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33067" }, { "cve": "CVE-2025-33075", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33075 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33075.json" } ], "title": "CVE-2025-33075" }, { "cve": "CVE-2025-47160", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47160 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47160.json" } ], "title": "CVE-2025-47160" }, { "cve": "CVE-2025-47955", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47955 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47955.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-47955" }, { "cve": "CVE-2025-33071", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33071 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33071.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33071" }, { "cve": "CVE-2025-24068", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24068 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24068.json" } ], "title": "CVE-2025-24068" }, { "cve": "CVE-2025-24069", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24069 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24069.json" } ], "title": "CVE-2025-24069" }, { "cve": "CVE-2025-24065", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24065 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-24065" }, { "cve": "CVE-2025-32725", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32725 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-32725" }, { "cve": "CVE-2025-33050", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33050 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33050.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33050" }, { "cve": "CVE-2025-33052", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33052 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33052.json" } ], "title": "CVE-2025-33052" }, { "cve": "CVE-2025-33053", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33053 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33053.json" } ], "title": "CVE-2025-33053" }, { "cve": "CVE-2025-33055", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33055 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33055.json" } ], "title": "CVE-2025-33055" }, { "cve": "CVE-2025-33056", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33056 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33056" }, { "cve": "CVE-2025-33057", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33057 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33057.json" } ], "title": "CVE-2025-33057" }, { "cve": "CVE-2025-33068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33068 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33068.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33068" }, { "cve": "CVE-2025-33070", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33070 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33070.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-33070" }, { "cve": "CVE-2025-33073", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33073 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33073.json" } ], "title": "CVE-2025-33073" }, { "cve": "CVE-2025-3052", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-3052 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3052.json" } ], "title": "CVE-2025-3052" }, { "cve": "CVE-2025-47969", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47969 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47969.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] } ], "title": "CVE-2025-47969" }, { "cve": "CVE-2025-33069", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-33069 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33069.json" } ], "title": "CVE-2025-33069" }, { "cve": "CVE-2025-47956", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1440176", "CSAFPID-2906488", "CSAFPID-2835398", "CSAFPID-2906409", "CSAFPID-2835399", "CSAFPID-2906410", "CSAFPID-2906570", "CSAFPID-2906571", "CSAFPID-2835392", "CSAFPID-2906396", "CSAFPID-2906560", "CSAFPID-2906561", "CSAFPID-2835393", "CSAFPID-2906400", "CSAFPID-2906562", "CSAFPID-2906563", "CSAFPID-2906564", "CSAFPID-2835395", "CSAFPID-2906402", "CSAFPID-2906567", "CSAFPID-2906566", "CSAFPID-2906565", "CSAFPID-2906568", "CSAFPID-2906569", "CSAFPID-2906546", "CSAFPID-2906547", "CSAFPID-2906437", "CSAFPID-2835397", "CSAFPID-2906405", "CSAFPID-2906549", "CSAFPID-2906550", "CSAFPID-2835405", "CSAFPID-2906407", "CSAFPID-2906552", "CSAFPID-2906553", "CSAFPID-2835394", "CSAFPID-2906401", "CSAFPID-2906436", "CSAFPID-2835396", "CSAFPID-2906404", "CSAFPID-1440177", "CSAFPID-2906487", "CSAFPID-2906572", "CSAFPID-2906484", "CSAFPID-2844067", "CSAFPID-2906419", "CSAFPID-2835403", "CSAFPID-2906420", "CSAFPID-2835404", "CSAFPID-2906421", "CSAFPID-2835625", "CSAFPID-2835626", "CSAFPID-2844065", "CSAFPID-2906417", "CSAFPID-2844066", "CSAFPID-2906418", "CSAFPID-2906556", "CSAFPID-2906557", "CSAFPID-2906558", "CSAFPID-2906559", "CSAFPID-2835627", "CSAFPID-2835222", "CSAFPID-2906413", "CSAFPID-2835628", "CSAFPID-2835223", "CSAFPID-2906414", "CSAFPID-2835629", "CSAFPID-2835224", "CSAFPID-2906415", "CSAFPID-2835630", "CSAFPID-2835225", "CSAFPID-2906416", "CSAFPID-2835619", "CSAFPID-2835220", "CSAFPID-2906411", "CSAFPID-2835620", "CSAFPID-2835221", "CSAFPID-2906412", "CSAFPID-2835596", "CSAFPID-2835214", "CSAFPID-2906397", "CSAFPID-2835597", "CSAFPID-2835215", "CSAFPID-2906398", "CSAFPID-2906544", "CSAFPID-2835216", "CSAFPID-2906399", "CSAFPID-2906545", "CSAFPID-2906551", "CSAFPID-2835218", "CSAFPID-2906406", "CSAFPID-2906554", "CSAFPID-2835219", "CSAFPID-2906408", "CSAFPID-2906548", "CSAFPID-2835217", "CSAFPID-2906403" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47956 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47956.json" } ], "title": "CVE-2025-47956" } ] }
fkie_cve-2025-3052
Vulnerability from fkie_nvd
Published
2025-06-10 20:15
Modified
2025-06-12 16:06
Severity ?
Summary
An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise." }, { "lang": "es", "value": "Una vulnerabilidad de escritura arbitraria en el firmware UEFI firmado por Microsoft permite la ejecuci\u00f3n de c\u00f3digo de software no confiable. Esto permite a un atacante controlar su valor, lo que provoca escrituras arbitrarias en memoria, incluyendo la modificaci\u00f3n de configuraciones cr\u00edticas del firmware almacenadas en la NVRAM. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda permitir eludir la seguridad, mecanismos de persistencia o comprometer completamente el sistema." } ], "id": "CVE-2025-3052", "lastModified": "2025-06-12T16:06:29.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-06-10T20:15:23.037", "references": [ { "source": "cret@cert.org", "url": "https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html" }, { "source": "cret@cert.org", "url": "https://www.binarly.io/advisories/brly-dva-2025-001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/806555" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Awaiting Analysis" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…