Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53769 (GCVE-0-2025-53769)
Vulnerability from cvelistv5
Published
2025-08-12 17:10
Modified
2025-08-15 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-73 - External Control of File Name or Path
Summary
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
References
► | URL | Tags | |
---|---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Windows Security App |
Version: 1000.0.0.0 < 1000.27840.1000.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53769", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T19:59:40.298105Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T19:59:51.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "Unknown" ], "product": "Windows Security App", "vendor": "Microsoft", "versions": [ { "lessThan": "1000.27840.1000.0", "status": "affected", "version": "1000.0.0.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*", "versionEndExcluding": "1000.27840.1000.0", "versionStartIncluding": "1000.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2025-08-12T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73: External Control of File Name or Path", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-15T20:33:05.912Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Windows Security App Spoofing Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769" } ], "title": "Windows Security App Spoofing Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2025-53769", "datePublished": "2025-08-12T17:10:38.187Z", "dateReserved": "2025-07-09T13:25:25.500Z", "dateUpdated": "2025-08-15T20:33:05.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-53769\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-12T18:15:45.627\",\"lastModified\":\"2025-08-15T16:58:17.243\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.\"},{\"lang\":\"es\",\"value\":\"El control externo del nombre o la ruta del archivo en la aplicaci\u00f3n de seguridad de Windows permite que un atacante autorizado realice suplantaci\u00f3n de identidad localmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1000.27840.0.1000\",\"matchCriteriaId\":\"89D809CC-D52F-4197-ADC6-A52E774381F9\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53769\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-12T19:59:40.298105Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T19:59:44.224Z\"}}], \"cna\": {\"title\": \"Windows Security App Spoofing Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Windows Security App\", \"versions\": [{\"status\": \"affected\", \"version\": \"1000.0.0.0\", \"lessThan\": \"1000.27840.1000.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2025-08-12T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769\", \"name\": \"Windows Security App Spoofing Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-73\", \"description\": \"CWE-73: External Control of File Name or Path\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"1000.27840.1000.0\", \"versionStartIncluding\": \"1000.0.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-08-15T20:33:05.912Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-53769\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-15T20:33:05.912Z\", \"dateReserved\": \"2025-07-09T13:25:25.500Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-12T17:10:38.187Z\", \"assignerShortName\": \"microsoft\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ncsc-2025-0251
Vulnerability from csaf_ncscnl
Published
2025-08-13 07:25
Modified
2025-08-13 07:25
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows, waaronder Hyper-V, Graphics Component, en Routing and Remote Access Service (RRAS).
Interpretaties
De kwetsbaarheden omvatten verschillende soorten aanvallen, zoals lokale privilege-escalatie, onterecht toegang tot gevoelige informatie, en de mogelijkheid voor ongeautoriseerde code-uitvoering.
```
Windows Security App:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53769 | 5.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows StateRepository API:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53789 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50161 | 7.30 | Verkrijgen van verhoogde rechten |
| CVE-2025-53132 | 8.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Desktop Windows Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50153 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53152 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Graphics Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50176 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows NTLM:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53778 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Ancillary Function Driver for WinSock:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-49762 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2025-53134 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2025-53137 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2025-53141 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53147 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2025-53154 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53718 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-49761 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53151 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Storage Port Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53156 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Kernel Transaction Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53140 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Brokering File System:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53142 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Connected Devices Platform Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53721 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Installer:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50173 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Graphics Component:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-49743 | 6.70 | Verkrijgen van verhoogde rechten |
| CVE-2025-50165 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Remote Desktop Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50171 | 9.10 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Kerberos:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53779 | 7.20 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Routing and Remote Access Service (RRAS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-49757 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2025-50156 | 5.70 | Toegang tot gevoelige gegevens |
| CVE-2025-50160 | 8.00 | Uitvoeren van willekeurige code |
| CVE-2025-50162 | 8.00 | Uitvoeren van willekeurige code |
| CVE-2025-50163 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2025-50164 | 8.00 | Uitvoeren van willekeurige code |
| CVE-2025-53138 | 5.70 | Toegang tot gevoelige gegevens |
| CVE-2025-53148 | 5.70 | Toegang tot gevoelige gegevens |
| CVE-2025-53153 | 5.70 | Toegang tot gevoelige gegevens |
| CVE-2025-53719 | 5.70 | Toegang tot gevoelige gegevens |
| CVE-2025-53720 | 8.00 | Uitvoeren van willekeurige code |
| CVE-2025-50157 | 5.70 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows NTFS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50158 | 7.00 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Role: Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-49751 | 6.80 | Denial-of-Service |
| CVE-2025-50167 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2025-53155 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53723 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-48807 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows NT OS Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53136 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows PrintWorkflowUserSvc:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53133 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Push Notifications:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53724 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53725 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-53726 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2025-50155 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows File Explorer:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50154 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Remote Desktop Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53722 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Media:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53131 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Distributed Transaction Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50166 | 6.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows SMB:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50169 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Kernel Streaming WOW Thunk Service Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53149 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Cloud Files Mini Filter Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50170 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows DirectX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50172 | 6.50 | Denial-of-Service |
| CVE-2025-53135 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Remote Access Point-to-Point Protocol (PPP) EAP-TLS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50159 | 7.30 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Local Security Authority Subsystem Service (LSASS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53716 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows GDI+:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53766 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Message Queuing:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50177 | 8.10 | Uitvoeren van willekeurige code |
| CVE-2025-53143 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2025-53144 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2025-53145 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Win32K - ICOMP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-50168 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen
Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-197
Numeric Truncation Error
CWE-820
Missing Synchronization
CWE-1390
Weak Authentication
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CWE-822
Untrusted Pointer Dereference
CWE-280
Improper Handling of Insufficient Permissions or Privileges
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-415
Double Free
CWE-908
Use of Uninitialized Resource
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-23
Relative Path Traversal
CWE-190
Integer Overflow or Wraparound
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-306
Missing Authentication for Critical Function
CWE-862
Missing Authorization
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-73
External Control of File Name or Path
CWE-287
Improper Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows, waaronder Hyper-V, Graphics Component, en Routing and Remote Access Service (RRAS).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten verschillende soorten aanvallen, zoals lokale privilege-escalatie, onterecht toegang tot gevoelige informatie, en de mogelijkheid voor ongeautoriseerde code-uitvoering. \n```\nWindows Security App: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53769 | 5.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows StateRepository API: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53789 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50161 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53132 | 8.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nDesktop Windows Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50153 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53152 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nGraphics Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50176 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53778 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-49762 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53134 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53137 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53141 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53147 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53154 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53718 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-49761 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53151 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nStorage Port Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53156 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nKernel Transaction Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53140 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Brokering File System: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53142 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Connected Devices Platform Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53721 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50173 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-49743 | 6.70 | Verkrijgen van verhoogde rechten | \n| CVE-2025-50165 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50171 | 9.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53779 | 7.20 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-49757 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2025-50156 | 5.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-50160 | 8.00 | Uitvoeren van willekeurige code | \n| CVE-2025-50162 | 8.00 | Uitvoeren van willekeurige code | \n| CVE-2025-50163 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2025-50164 | 8.00 | Uitvoeren van willekeurige code | \n| CVE-2025-53138 | 5.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-53148 | 5.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-53153 | 5.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-53719 | 5.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-53720 | 8.00 | Uitvoeren van willekeurige code | \n| CVE-2025-50157 | 5.70 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50158 | 7.00 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-49751 | 6.80 | Denial-of-Service | \n| CVE-2025-50167 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53155 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53723 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-48807 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows NT OS Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53136 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows PrintWorkflowUserSvc: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53133 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Push Notifications: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53724 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53725 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-53726 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-50155 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows File Explorer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50154 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53722 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53131 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50166 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows SMB: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50169 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nKernel Streaming WOW Thunk Service Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53149 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cloud Files Mini Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50170 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows DirectX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50172 | 6.50 | Denial-of-Service | \n| CVE-2025-53135 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Access Point-to-Point Protocol (PPP) EAP-TLS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50159 | 7.30 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority Subsystem Service (LSASS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53716 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows GDI+: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53766 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50177 | 8.10 | Uitvoeren van willekeurige code | \n| CVE-2025-53143 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2025-53144 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2025-53145 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-50168 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Missing Synchronization", "title": "CWE-820" }, { "category": "general", "text": "Weak Authentication", "title": "CWE-1390" }, { "category": "general", "text": "Improper Restriction of Communication Channel to Intended Endpoints", "title": "CWE-923" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Relative Path Traversal", "title": "CWE-23" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference", "url": "https://portal.msrc.microsoft.com/en-us/security-guidance" } ], "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2025-08-13T07:25:08.789693Z", "generator": { "date": "2025-08-04T16:30:00Z", "engine": { "name": "V.A.", "version": "1.2" } }, "id": "NCSC-2025-0251", "initial_release_date": "2025-08-13T07:25:08.789693Z", "revision_history": [ { "date": "2025-08-13T07:25:08.789693Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.19045.0|\u003c10.0.19044.6093", "product": { "name": "vers:unknown/10.0.19045.0|\u003c10.0.19044.6093", "product_id": "CSAFPID-3048680" } }, { "category": "product_version_range", "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.6216", "product": { "name": "vers:unknown/10.0.19045.0|\u003c10.0.19045.6216", "product_id": "CSAFPID-3048714" } } ], "category": "product_name", "name": "Windows 10 Version 22H2" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.6216", "product": { "name": "vers:microsoft/10.0.19045.6216", "product_id": "CSAFPID-3048833", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.6216:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.6216", "product": { "name": "vers:microsoft/10.0.19045.6216", "product_id": "CSAFPID-3048832", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.6216:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.6216", "product": { "name": "vers:microsoft/10.0.19045.6216", "product_id": "CSAFPID-3048803", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.6216:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.10240.21100", "product": { "name": "vers:microsoft/10.0.10240.21100", "product_id": "CSAFPID-3048834", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21100:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.10240.21100", "product": { "name": "vers:microsoft/10.0.10240.21100", "product_id": "CSAFPID-3048835", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21100:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 for x64-based Systems" } ], "category": "product_family", "name": "Windows" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3533 on aarch64", "product": { "name": "vers:microsoft/10.0.22000.3533 on aarch64", "product_id": "CSAFPID-2978754" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3533 on x86 64", "product": { "name": "vers:microsoft/10.0.22000.3533 on x86 64", "product_id": "CSAFPID-2978746" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3592 on aarch64", "product": { "name": "vers:microsoft/10.0.22000.3592 on aarch64", "product_id": "CSAFPID-3048961" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3592 on x86 64", "product": { "name": "vers:microsoft/10.0.22000.3592 on x86 64", "product_id": "CSAFPID-3048960" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3839 on aarch64", "product": { "name": "vers:microsoft/10.0.22000.3839 on aarch64", "product_id": "CSAFPID-3049105" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22000.3839 on x86 64", "product": { "name": "vers:microsoft/10.0.22000.3839 on x86 64", "product_id": "CSAFPID-3049112" } } ], "category": "product_name", "name": "Windows 11 21h2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.4659 on aarch64", "product": { "name": "vers:microsoft/10.0.22621.4659 on aarch64", "product_id": "CSAFPID-3049081" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.4659 on x86 64", "product": { "name": "vers:microsoft/10.0.22621.4659 on x86 64", "product_id": "CSAFPID-3049085" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.4880 on aarch64", "product": { "name": "vers:microsoft/10.0.22621.4880 on aarch64", "product_id": "CSAFPID-3049104" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.4880 on x86 64", "product": { "name": "vers:microsoft/10.0.22621.4880 on x86 64", "product_id": "CSAFPID-3049115" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5033 on aarch64", "product": { "name": "vers:microsoft/10.0.22621.5033 on aarch64", "product_id": "CSAFPID-3048967" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5033 on x86 64", "product": { "name": "vers:microsoft/10.0.22621.5033 on x86 64", "product_id": "CSAFPID-3048970" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5624 on aarch64", "product": { "name": "vers:microsoft/10.0.22621.5624 on aarch64", "product_id": "CSAFPID-2978663" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5624 on x86 64", "product": { "name": "vers:microsoft/10.0.22621.5624 on x86 64", "product_id": "CSAFPID-2978670" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5768 on aarch64", "product": { "name": "vers:microsoft/10.0.22621.5768 on aarch64", "product_id": "CSAFPID-3048906" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5768 on x64", "product": { "name": "vers:microsoft/10.0.22621.5768 on x64", "product_id": "CSAFPID-3049076" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5768 on x86 64", "product": { "name": "vers:microsoft/10.0.22621.5768 on x86 64", "product_id": "CSAFPID-3048927" } }, { "category": "product_version_range", "name": "vers:microsoft/10.0.22631.5624 on aarch64", "product": { "name": "vers:microsoft/10.0.22631.5624 on aarch64", "product_id": "CSAFPID-3049188" } } ], "category": "product_name", "name": "Windows 11 22H2" } ], "category": "product_family", "name": "Microsoft" } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-48807", "cwe": { "id": "CWE-923", "name": "Improper Restriction of Communication Channel to Intended Endpoints" }, "notes": [ { "category": "other", "text": "Improper Restriction of Communication Channel to Intended Endpoints", "title": "CWE-923" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48807 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48807.json" } ], "title": "CVE-2025-48807" }, { "cve": "CVE-2025-49743", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-49743 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49743.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-49743" }, { "cve": "CVE-2025-49751", "cwe": { "id": "CWE-820", "name": "Missing Synchronization" }, "notes": [ { "category": "other", "text": "Missing Synchronization", "title": "CWE-820" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-49751 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49751.json" } ], "title": "CVE-2025-49751" }, { "cve": "CVE-2025-49757", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-49757 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49757.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-49757" }, { "cve": "CVE-2025-49761", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-49761 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49761.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-49761" }, { "cve": "CVE-2025-49762", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-49762 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49762.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-49762" }, { "cve": "CVE-2025-50153", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50153 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50153.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50153" }, { "cve": "CVE-2025-50154", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50154 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50154.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50154" }, { "cve": "CVE-2025-50155", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50155 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50155.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50155" }, { "cve": "CVE-2025-50156", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50156 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50156.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50156" }, { "cve": "CVE-2025-50157", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50157 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50157.json" } ], "title": "CVE-2025-50157" }, { "cve": "CVE-2025-50158", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50158 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50158.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50158" }, { "cve": "CVE-2025-50159", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50159 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50159.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50159" }, { "cve": "CVE-2025-50160", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50160 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50160.json" } ], "title": "CVE-2025-50160" }, { "cve": "CVE-2025-50161", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50161 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50161.json" } ], "title": "CVE-2025-50161" }, { "cve": "CVE-2025-50162", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50162 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50162.json" } ], "title": "CVE-2025-50162" }, { "cve": "CVE-2025-50163", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50163 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50163.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50163" }, { "cve": "CVE-2025-50164", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50164 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50164.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50164" }, { "cve": "CVE-2025-50165", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50165 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50165.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50165" }, { "cve": "CVE-2025-50166", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50166 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50166.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50166" }, { "cve": "CVE-2025-50167", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50167 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50167" }, { "cve": "CVE-2025-50168", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50168 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50168.json" } ], "title": "CVE-2025-50168" }, { "cve": "CVE-2025-50169", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50169 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50169.json" } ], "title": "CVE-2025-50169" }, { "cve": "CVE-2025-50170", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50170 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50170" }, { "cve": "CVE-2025-50171", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50171 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50171.json" } ], "title": "CVE-2025-50171" }, { "cve": "CVE-2025-50172", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50172 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50172.json" } ], "title": "CVE-2025-50172" }, { "cve": "CVE-2025-50173", "cwe": { "id": "CWE-1390", "name": "Weak Authentication" }, "notes": [ { "category": "other", "text": "Weak Authentication", "title": "CWE-1390" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50173 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50173.json" } ], "title": "CVE-2025-50173" }, { "cve": "CVE-2025-50176", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50176 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-50176" }, { "cve": "CVE-2025-50177", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-50177 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50177.json" } ], "title": "CVE-2025-50177" }, { "cve": "CVE-2025-53131", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53131 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53131.json" } ], "title": "CVE-2025-53131" }, { "cve": "CVE-2025-53132", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53132 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53132.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53132" }, { "cve": "CVE-2025-53133", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53133 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53133.json" } ], "title": "CVE-2025-53133" }, { "cve": "CVE-2025-53134", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53134 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53134.json" } ], "title": "CVE-2025-53134" }, { "cve": "CVE-2025-53135", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53135 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53135.json" } ], "title": "CVE-2025-53135" }, { "cve": "CVE-2025-53136", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53136 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53136.json" } ], "title": "CVE-2025-53136" }, { "cve": "CVE-2025-53137", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53137 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53137.json" } ], "title": "CVE-2025-53137" }, { "cve": "CVE-2025-53138", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53138 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53138.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53138" }, { "cve": "CVE-2025-53140", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53140 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53140.json" } ], "title": "CVE-2025-53140" }, { "cve": "CVE-2025-53141", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53141 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53141.json" } ], "title": "CVE-2025-53141" }, { "cve": "CVE-2025-53142", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53142 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53142.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53142" }, { "cve": "CVE-2025-53143", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53143 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53143.json" } ], "title": "CVE-2025-53143" }, { "cve": "CVE-2025-53144", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53144 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53144.json" } ], "title": "CVE-2025-53144" }, { "cve": "CVE-2025-53145", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53145 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53145.json" } ], "title": "CVE-2025-53145" }, { "cve": "CVE-2025-53147", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53147 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53147" }, { "cve": "CVE-2025-53148", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53148 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53148.json" } ], "title": "CVE-2025-53148" }, { "cve": "CVE-2025-53149", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53149 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53149.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53149" }, { "cve": "CVE-2025-53151", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53151 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53151.json" } ], "title": "CVE-2025-53151" }, { "cve": "CVE-2025-53152", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53152 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53152.json" } ], "title": "CVE-2025-53152" }, { "cve": "CVE-2025-53153", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53153 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53153.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53153" }, { "cve": "CVE-2025-53154", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53154 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53154.json" } ], "title": "CVE-2025-53154" }, { "cve": "CVE-2025-53155", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53155 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53155.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53155" }, { "cve": "CVE-2025-53156", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53156 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53156.json" } ], "title": "CVE-2025-53156" }, { "cve": "CVE-2025-53716", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53716 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53716.json" } ], "title": "CVE-2025-53716" }, { "cve": "CVE-2025-53718", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53718 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53718.json" } ], "title": "CVE-2025-53718" }, { "cve": "CVE-2025-53719", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53719 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53719.json" } ], "title": "CVE-2025-53719" }, { "cve": "CVE-2025-53720", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53720 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53720.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53720" }, { "cve": "CVE-2025-53721", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53721 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53721.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53721" }, { "cve": "CVE-2025-53722", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53722 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53722.json" } ], "title": "CVE-2025-53722" }, { "cve": "CVE-2025-53723", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53723 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53723.json" } ], "title": "CVE-2025-53723" }, { "cve": "CVE-2025-53724", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53724 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53724.json" } ], "title": "CVE-2025-53724" }, { "cve": "CVE-2025-53725", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53725 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53725" }, { "cve": "CVE-2025-53726", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53726 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53726.json" } ], "title": "CVE-2025-53726" }, { "cve": "CVE-2025-53766", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53766 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53766.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53766" }, { "cve": "CVE-2025-53769", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53769 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53769.json" } ], "title": "CVE-2025-53769" }, { "cve": "CVE-2025-53778", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53778 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53778.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53778" }, { "cve": "CVE-2025-53779", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "other", "text": "Relative Path Traversal", "title": "CWE-23" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53779 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53779.json" } ], "title": "CVE-2025-53779" }, { "cve": "CVE-2025-53789", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53789 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53789.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-3048680", "CSAFPID-3048714", "CSAFPID-3048833", "CSAFPID-3048832", "CSAFPID-3048803", "CSAFPID-3048834", "CSAFPID-3048835", "CSAFPID-2978754", "CSAFPID-2978746", "CSAFPID-3048961", "CSAFPID-3048960", "CSAFPID-3049105", "CSAFPID-3049112", "CSAFPID-3049081", "CSAFPID-3049085", "CSAFPID-3049104", "CSAFPID-3049115", "CSAFPID-3048967", "CSAFPID-3048970", "CSAFPID-2978663", "CSAFPID-2978670", "CSAFPID-3048906", "CSAFPID-3049076", "CSAFPID-3048927", "CSAFPID-3049188" ] } ], "title": "CVE-2025-53789" } ] }
msrc_cve-2025-53769
Vulnerability from csaf_microsoft
Published
2025-08-12 07:00
Modified
2025-08-12 07:00
Summary
Windows Security App Spoofing Vulnerability
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action
Required. The vulnerability documented by this CVE requires customer action to resolve.
{ "document": { "acknowledgments": [ { "names": [ "\u003ca href=\"https://twitter.com/bohops\"\u003eJimmy Bayne of IBM X-Force\u003c/a\u003e" ] } ], "aggregate_severity": { "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Public", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.", "title": "Disclaimer" }, { "category": "general", "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.", "title": "Customer Action" } ], "publisher": { "category": "vendor", "contact_details": "secure@microsoft.com", "name": "Microsoft Security Response Center", "namespace": "https://msrc.microsoft.com" }, "references": [ { "category": "self", "summary": "CVE-2025-53769 Windows Security App Spoofing Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769" }, { "category": "self", "summary": "CVE-2025-53769 Windows Security App Spoofing Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53769.json" }, { "category": "external", "summary": "Microsoft Exploitability Index", "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1" }, { "category": "external", "summary": "Microsoft Support Lifecycle", "url": "https://support.microsoft.com/lifecycle" }, { "category": "external", "summary": "Common Vulnerability Scoring System", "url": "https://www.first.org/cvss" } ], "title": "Windows Security App Spoofing Vulnerability", "tracking": { "current_release_date": "2025-08-12T07:00:00.000Z", "generator": { "date": "2025-08-15T20:32:07.557Z", "engine": { "name": "MSRC Generator", "version": "1.0" } }, "id": "msrc_CVE-2025-53769", "initial_release_date": "2025-08-12T07:00:00.000Z", "revision_history": [ { "date": "2025-08-12T07:00:00.000Z", "legacy_version": "1", "number": "1", "summary": "Information published." } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1000.27840.1000.0", "product": { "name": "Windows Security App \u003c1000.27840.1000.0", "product_id": "1" } }, { "category": "product_version", "name": "1000.27840.1000.0", "product": { "name": "Windows Security App 1000.27840.1000.0", "product_id": "16766" } } ], "category": "product_name", "name": "Windows Security App" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53769", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "general", "text": "Microsoft", "title": "Assigning CNA" } ], "product_status": { "fixed": [ "16766" ], "known_affected": [ "1" ] }, "references": [ { "category": "self", "summary": "CVE-2025-53769 Windows Security App Spoofing Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769" }, { "category": "self", "summary": "CVE-2025-53769 Windows Security App Spoofing Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53769.json" } ], "remediations": [ { "category": "vendor_fix", "date": "2025-08-12T07:00:00.000Z", "details": "1000.27840.1000.0:Security Update:https://support.microsoft.com/en-us/windows/stay-protected-with-the-windows-security-app-2ae0363d-0ada-c064-8b56-6a39afb6a963", "product_ids": [ "1" ], "url": "https://support.microsoft.com/en-us/windows/stay-protected-with-the-windows-security-app-2ae0363d-0ada-c064-8b56-6a39afb6a963" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalsScore": 0.0, "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.8, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "threats": [ { "category": "impact", "details": "Spoofing" }, { "category": "exploit_status", "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely" } ], "title": "Windows Security App Spoofing Vulnerability" } ] }
ghsa-78fp-x36m-f5gf
Vulnerability from github
Published
2025-08-12 18:31
Modified
2025-08-12 18:31
Severity ?
VLAI Severity ?
Details
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
{ "affected": [], "aliases": [ "CVE-2025-53769" ], "database_specific": { "cwe_ids": [ "CWE-73" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-12T18:15:45Z", "severity": "MODERATE" }, "details": "External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.", "id": "GHSA-78fp-x36m-f5gf", "modified": "2025-08-12T18:31:32Z", "published": "2025-08-12T18:31:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53769" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2025-53769
Vulnerability from fkie_nvd
Published
2025-08-12 18:15
Modified
2025-08-15 16:58
Severity ?
Summary
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
References
▶ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_security_app | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*", "matchCriteriaId": "89D809CC-D52F-4197-ADC6-A52E774381F9", "versionEndExcluding": "1000.27840.0.1000", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally." }, { "lang": "es", "value": "El control externo del nombre o la ruta del archivo en la aplicaci\u00f3n de seguridad de Windows permite que un atacante autorizado realice suplantaci\u00f3n de identidad localmente." } ], "id": "CVE-2025-53769", "lastModified": "2025-08-15T16:58:17.243", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "secure@microsoft.com", "type": "Primary" } ] }, "published": "2025-08-12T18:15:45.627", "references": [ { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-73" } ], "source": "secure@microsoft.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…