Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-28882 (GCVE-0-2024-28882)
Vulnerability from cvelistv5 – Published: 2024-07-08 21:30 – Updated: 2024-11-01 20:38- CWE-772 - Missing Release of Resource after Effective Lifetime
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-28882",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-09T14:48:10.705315Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-01T20:38:32.966Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:03:50.213Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "OpenVPN",
"vendor": "OpenVPN",
"versions": [
{
"lessThanOrEqual": "2.6.10",
"status": "affected",
"version": "2.6.0",
"versionType": "patch"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-772",
"description": "Missing Release of Resource after Effective Lifetime",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-09T12:19:57.631Z",
"orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
"shortName": "OpenVPN"
},
"references": [
{
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
},
{
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
"assignerShortName": "OpenVPN",
"cveId": "CVE-2024-28882",
"datePublished": "2024-07-08T21:30:24.798Z",
"dateReserved": "2024-03-12T18:26:01.733Z",
"dateUpdated": "2024-11-01T20:38:32.966Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\"}, {\"lang\": \"es\", \"value\": \"OpenVPN 2.6.10 y versiones anteriores en una funci\\u00f3n de servidor aceptan m\\u00faltiples notificaciones de salida de clientes autenticados que extender\\u00e1n la validez de una sesi\\u00f3n de cierre\"}]",
"id": "CVE-2024-28882",
"lastModified": "2024-11-21T09:07:06.380",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}]}",
"published": "2024-07-08T22:15:02.410",
"references": "[{\"url\": \"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\", \"source\": \"security@openvpn.net\"}, {\"url\": \"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\", \"source\": \"security@openvpn.net\"}, {\"url\": \"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@openvpn.net",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security@openvpn.net\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-772\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-28882\",\"sourceIdentifier\":\"security@openvpn.net\",\"published\":\"2024-07-08T22:15:02.410\",\"lastModified\":\"2025-06-10T16:26:09.473\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\"},{\"lang\":\"es\",\"value\":\"OpenVPN 2.6.10 y versiones anteriores en una funci\u00f3n de servidor aceptan m\u00faltiples notificaciones de salida de clientes autenticados que extender\u00e1n la validez de una sesi\u00f3n de cierre\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security@openvpn.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndExcluding\":\"2.6.11\",\"matchCriteriaId\":\"0D6C4FD9-4627-4A45-89FC-2DB53985C516\"}]}]}],\"references\":[{\"url\":\"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\",\"source\":\"security@openvpn.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\",\"source\":\"security@openvpn.net\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T01:03:50.213Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-28882\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-09T14:48:10.705315Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-09T14:48:17.723Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"OpenVPN\", \"product\": \"OpenVPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.0\", \"versionType\": \"patch\", \"lessThanOrEqual\": \"2.6.10\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\"}, {\"url\": \"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-772\", \"description\": \"Missing Release of Resource after Effective Lifetime\"}]}], \"providerMetadata\": {\"orgId\": \"36a55730-e66d-4d39-8ca6-3c3b3017965e\", \"shortName\": \"OpenVPN\", \"dateUpdated\": \"2024-07-09T12:19:57.631Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-28882\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-01T20:38:32.966Z\", \"dateReserved\": \"2024-03-12T18:26:01.733Z\", \"assignerOrgId\": \"36a55730-e66d-4d39-8ca6-3c3b3017965e\", \"datePublished\": \"2024-07-08T21:30:24.798Z\", \"assignerShortName\": \"OpenVPN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CVE-2024-28882
Vulnerability from fstec - Published: 08.07.2024{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u043e\u0442 2.6.0 \u0434\u043e 2.6.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (OpenVPN), 1.8 (Astra Linux Special Edition), 3.8 (Astra Linux Special Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f OpenVPN:\nhttps://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openvpn \u0434\u043e 2.6.3-1+deb12u3+ci1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.07.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.08.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06537",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-28882",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), OpenVPN, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 3.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f OpenVPN, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0432\u044b\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e\u0441\u043b\u0435 \u043e\u043a\u043e\u043d\u0447\u0430\u043d\u0438\u044f \u0441\u0440\u043e\u043a\u0430 \u0435\u0433\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u00ab\u0441\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u044c \u0441\u0435\u0430\u043d\u0441\u00bb, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0431\u044b\u043b\u043e \u043f\u0440\u0438\u043a\u0430\u0437\u0430\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u044d\u0442\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e\u0441\u043b\u0435 \u0438\u0441\u0442\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0441\u0440\u043e\u043a\u0430 \u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f (CWE-772)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f OpenVPN \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0432\u044b\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e\u0441\u043b\u0435 \u043e\u043a\u043e\u043d\u0447\u0430\u043d\u0438\u044f \u0441\u0440\u043e\u043a\u0430 \u0435\u0433\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u00ab\u0441\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u044c \u0441\u0435\u0430\u043d\u0441\u00bb, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0431\u044b\u043b\u043e \u043f\u0440\u0438\u043a\u0430\u0437\u0430\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u044d\u0442\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882\nhttps://redos.red-soft.ru/support/secure/\nhttps://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html\nhttps://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0904SE18MD\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38\nhttps://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-772",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)"
}
NCSC-2025-0077
Vulnerability from csaf_ncscnl - Published: 2025-03-11 12:30 - Updated: 2025-03-11 12:30Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als SCALANCE, SIMATIC, SINAMICS, SINEMA, SiPass, Teamcenter en Tecnomatix.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "general",
"text": "Unverified Ownership",
"title": "CWE-283"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Communication Channel to Intended Endpoints",
"title": "CWE-923"
},
{
"category": "general",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "general",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
},
{
"category": "general",
"text": "Improper Output Neutralization for Logs",
"title": "CWE-117"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-050438.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-073066.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-075201.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-216014.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-280834.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-503939.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-507653.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-515903.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-615740.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-787280.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-858251.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-03-11T12:30:29.277759Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0077",
"initial_release_date": "2025-03-11T12:30:29.277759Z",
"revision_history": [
{
"date": "2025-03-11T12:30:29.277759Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459094"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459095"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/3.x",
"product": {
"name": "vers:unknown/3.x",
"product_id": "CSAFPID-2459491"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.0",
"product": {
"name": "vers:unknown/\u003cv4.0",
"product_id": "CSAFPID-2459084"
}
}
],
"category": "product_name",
"name": "SCALANCE LPE9403"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459096"
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299125"
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299126"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299127"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459097"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299128"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299129"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459098"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459099"
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299130"
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459100"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299131"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459101"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299132"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459102"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299133"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459103"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299134"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459104"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299135"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459105"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299136"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459106"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299137"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459107"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299138"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459108"
}
}
],
"category": "product_name",
"name": "SCALANCE MUB852-1 (A1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459109"
}
}
],
"category": "product_name",
"name": "SCALANCE MUB852-1 (B1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459110"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299139"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459111"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299140"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459112"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299141"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459113"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299142"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459114"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299143"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459115"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299144"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459116"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299145"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459117"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299146"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459118"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299147"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.2.1",
"product": {
"name": "vers:unknown/\u003cv8.2.1",
"product_id": "CSAFPID-2459119"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299148"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459120"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459042"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv26.01.12",
"product": {
"name": "vers:unknown/\u003cv26.01.12",
"product_id": "CSAFPID-2459077"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv31.01.07",
"product": {
"name": "vers:unknown/\u003cv31.01.07",
"product_id": "CSAFPID-2459043"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC BX-21A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv29.01.07",
"product": {
"name": "vers:unknown/\u003cv29.01.07",
"product_id": "CSAFPID-2459044"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC BX-32A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv29.01.07",
"product": {
"name": "vers:unknown/\u003cv29.01.07",
"product_id": "CSAFPID-2459045"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC BX-39A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv32.01.04",
"product": {
"name": "vers:unknown/\u003cv32.01.04",
"product_id": "CSAFPID-2459046"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC BX-59A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv29.01.07",
"product": {
"name": "vers:unknown/\u003cv29.01.07",
"product_id": "CSAFPID-2459047"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC PX-32A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv29.01.07",
"product": {
"name": "vers:unknown/\u003cv29.01.07",
"product_id": "CSAFPID-2459048"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC PX-39A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv29.01.07",
"product": {
"name": "vers:unknown/\u003cv29.01.07",
"product_id": "CSAFPID-2459049"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC PX-39A PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459050"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC RC-543B"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459051"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC RW-543A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459052"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC127E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459053"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC227E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459054"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC227G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459055"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC277E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459056"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC277G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459058"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC3000 SMART V3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459059"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC327G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459060"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC347G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459061"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC377G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459062"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC427E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459063"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459064"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459065"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC527G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv25.02.15",
"product": {
"name": "vers:unknown/\u003cv25.02.15",
"product_id": "CSAFPID-2459066"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC627E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv25.02.15",
"product": {
"name": "vers:unknown/\u003cv25.02.15",
"product_id": "CSAFPID-2459067"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC647E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv25.02.15",
"product": {
"name": "vers:unknown/\u003cv25.02.15",
"product_id": "CSAFPID-2459068"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC677E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv25.02.15",
"product": {
"name": "vers:unknown/\u003cv25.02.15",
"product_id": "CSAFPID-2459069"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC847E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459070"
}
}
],
"category": "product_name",
"name": "SIMATIC ITP1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459057"
}
}
],
"category": "product_name",
"name": "SIMATIC\u00a0IPC277G PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2459093"
}
}
],
"category": "product_name",
"name": "SINAMICS S200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.4.8",
"product": {
"name": "vers:unknown/\u003cv6.4.8",
"product_id": "CSAFPID-2459089"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.4.9",
"product": {
"name": "vers:unknown/\u003cv6.4.9",
"product_id": "CSAFPID-2459082"
}
}
],
"category": "product_name",
"name": "SiPass integrated AC5102 (ACC-G2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/6.4.0",
"product": {
"name": "vers:unknown/6.4.0",
"product_id": "CSAFPID-2459482"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.1",
"product": {
"name": "vers:unknown/6.4.1",
"product_id": "CSAFPID-2459483"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.2",
"product": {
"name": "vers:unknown/6.4.2",
"product_id": "CSAFPID-2459484"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.3",
"product": {
"name": "vers:unknown/6.4.3",
"product_id": "CSAFPID-2459485"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.4",
"product": {
"name": "vers:unknown/6.4.4",
"product_id": "CSAFPID-2459486"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.5",
"product": {
"name": "vers:unknown/6.4.5",
"product_id": "CSAFPID-2459487"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.6",
"product": {
"name": "vers:unknown/6.4.6",
"product_id": "CSAFPID-2459488"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.7",
"product": {
"name": "vers:unknown/6.4.7",
"product_id": "CSAFPID-2459489"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/6.4.8",
"product": {
"name": "vers:unknown/6.4.8",
"product_id": "CSAFPID-2459490"
}
}
],
"category": "product_name",
"name": "SiPass integrated AC5102, SiPass integrated ACC-AP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.4.8",
"product": {
"name": "vers:unknown/\u003cv6.4.8",
"product_id": "CSAFPID-2459090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.4.9",
"product": {
"name": "vers:unknown/\u003cv6.4.9",
"product_id": "CSAFPID-2459083"
}
}
],
"category": "product_name",
"name": "SiPass integrated ACC-AP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv14.3.0.13",
"product": {
"name": "vers:unknown/\u003cv14.3.0.13",
"product_id": "CSAFPID-2459071"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V14.3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2312.0009",
"product": {
"name": "vers:unknown/\u003cv2312.0009",
"product_id": "CSAFPID-2459072"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2312"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2406.0007",
"product": {
"name": "vers:unknown/\u003cv2406.0007",
"product_id": "CSAFPID-2459073"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2406"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2412.0002",
"product": {
"name": "vers:unknown/\u003cv2412.0002",
"product_id": "CSAFPID-2459074"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2412"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2302.0021",
"product": {
"name": "vers:unknown/\u003cv2302.0021",
"product_id": "CSAFPID-2459075"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2302"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2404.0010",
"product": {
"name": "vers:unknown/\u003cv2404.0010",
"product_id": "CSAFPID-2459076"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2404"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1305",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1305",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1305.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-1305"
},
{
"cve": "CVE-2024-4877",
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4877",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4877.json"
}
],
"title": "CVE-2024-4877"
},
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"notes": [
{
"category": "other",
"text": "Improper Output Neutralization for Logs",
"title": "CWE-117"
},
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5594",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-24974",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Communication Channel to Intended Endpoints",
"title": "CWE-923"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-24974"
},
{
"cve": "CVE-2024-27459",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27459",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27459.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-27459"
},
{
"cve": "CVE-2024-27903",
"cwe": {
"id": "CWE-283",
"name": "Unverified Ownership"
},
"notes": [
{
"category": "other",
"text": "Unverified Ownership",
"title": "CWE-283"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27903",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27903.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-27903"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-41046",
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-41046"
},
{
"cve": "CVE-2024-41049",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41049.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-41049"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-41055"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-42154",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42154.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-42154"
},
{
"cve": "CVE-2024-42161",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "other",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-42161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-42161"
},
{
"cve": "CVE-2024-42512",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-42512",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42512.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-42512"
},
{
"cve": "CVE-2024-42513",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "other",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-42513",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42513.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-42513"
},
{
"cve": "CVE-2024-52285",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52285",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52285.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-52285"
},
{
"cve": "CVE-2024-56181",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56181",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56181.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-56181"
},
{
"cve": "CVE-2024-56182",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-56182"
},
{
"cve": "CVE-2024-56336",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56336",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56336.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2024-56336"
},
{
"cve": "CVE-2025-23384",
"cwe": {
"id": "CWE-187",
"name": "Partial String Comparison"
},
"notes": [
{
"category": "other",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23384"
},
{
"cve": "CVE-2025-23396",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23396",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23396.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23396"
},
{
"cve": "CVE-2025-23397",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23397"
},
{
"cve": "CVE-2025-23398",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23398"
},
{
"cve": "CVE-2025-23399",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23399",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23399"
},
{
"cve": "CVE-2025-23400",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23400",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23400.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23400"
},
{
"cve": "CVE-2025-23401",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23401",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23401.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23401"
},
{
"cve": "CVE-2025-23402",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23402",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23402.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-23402"
},
{
"cve": "CVE-2025-25266",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25266",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-25266.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-25266"
},
{
"cve": "CVE-2025-25267",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25267",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-25267.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-25267"
},
{
"cve": "CVE-2025-27392",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27392",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27392.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27392"
},
{
"cve": "CVE-2025-27393",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27393",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27393.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27393"
},
{
"cve": "CVE-2025-27394",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27394",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27394.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27394"
},
{
"cve": "CVE-2025-27395",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27395",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27395"
},
{
"cve": "CVE-2025-27396",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27396",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27396.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27396"
},
{
"cve": "CVE-2025-27397",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27397.json"
}
],
"title": "CVE-2025-27397"
},
{
"cve": "CVE-2025-27398",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27398.json"
}
],
"title": "CVE-2025-27398"
},
{
"cve": "CVE-2025-27438",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27438",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27438.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27438"
},
{
"cve": "CVE-2025-27493",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27493",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27493.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27493"
},
{
"cve": "CVE-2025-27494",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27494",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27494.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2459094",
"CSAFPID-1299123",
"CSAFPID-2459095",
"CSAFPID-1299124",
"CSAFPID-2459491",
"CSAFPID-2459084",
"CSAFPID-2459096",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-2459097",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-2459098",
"CSAFPID-2459099",
"CSAFPID-1299130",
"CSAFPID-2459100",
"CSAFPID-1299131",
"CSAFPID-2459101",
"CSAFPID-1299132",
"CSAFPID-2459102",
"CSAFPID-1299133",
"CSAFPID-2459103",
"CSAFPID-1299134",
"CSAFPID-2459104",
"CSAFPID-1299135",
"CSAFPID-2459105",
"CSAFPID-1299136",
"CSAFPID-2459106",
"CSAFPID-1299137",
"CSAFPID-2459107",
"CSAFPID-1299138",
"CSAFPID-2459108",
"CSAFPID-2459109",
"CSAFPID-2459110",
"CSAFPID-1299139",
"CSAFPID-2459111",
"CSAFPID-1299140",
"CSAFPID-2459112",
"CSAFPID-1299141",
"CSAFPID-2459113",
"CSAFPID-1299142",
"CSAFPID-2459114",
"CSAFPID-1299143",
"CSAFPID-2459115",
"CSAFPID-1299144",
"CSAFPID-2459116",
"CSAFPID-1299145",
"CSAFPID-2459117",
"CSAFPID-1299146",
"CSAFPID-2459118",
"CSAFPID-1299147",
"CSAFPID-2459119",
"CSAFPID-1299148",
"CSAFPID-2459120",
"CSAFPID-2459042",
"CSAFPID-2459077",
"CSAFPID-2459043",
"CSAFPID-2459044",
"CSAFPID-2459045",
"CSAFPID-2459046",
"CSAFPID-2459047",
"CSAFPID-2459048",
"CSAFPID-2459049",
"CSAFPID-2459050",
"CSAFPID-2459051",
"CSAFPID-2459052",
"CSAFPID-2459053",
"CSAFPID-2459054",
"CSAFPID-2459055",
"CSAFPID-2459056",
"CSAFPID-2459058",
"CSAFPID-2459059",
"CSAFPID-2459060",
"CSAFPID-2459061",
"CSAFPID-2459062",
"CSAFPID-2459063",
"CSAFPID-2459064",
"CSAFPID-2459065",
"CSAFPID-2459066",
"CSAFPID-2459067",
"CSAFPID-2459068",
"CSAFPID-2459069",
"CSAFPID-2459070",
"CSAFPID-2459057",
"CSAFPID-2459093",
"CSAFPID-2459089",
"CSAFPID-2459082",
"CSAFPID-2459482",
"CSAFPID-2459483",
"CSAFPID-2459484",
"CSAFPID-2459485",
"CSAFPID-2459486",
"CSAFPID-2459487",
"CSAFPID-2459488",
"CSAFPID-2459489",
"CSAFPID-2459490",
"CSAFPID-2459090",
"CSAFPID-2459083",
"CSAFPID-2459071",
"CSAFPID-2459072",
"CSAFPID-2459073",
"CSAFPID-2459074",
"CSAFPID-2459075",
"CSAFPID-2459076"
]
}
],
"title": "CVE-2025-27494"
}
]
}
NCSC-2024-0433
Vulnerability from csaf_ncscnl - Published: 2024-11-12 14:19 - Updated: 2024-11-12 14:19Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "general",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Interpretation Conflict",
"title": "CWE-436"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-11-12T14:19:20.051128Z",
"id": "NCSC-2024-0433",
"initial_release_date": "2024-11-12T14:19:20.051128Z",
"revision_history": [
{
"date": "2024-11-12T14:19:20.051128Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix_runtime_v10.12",
"product": {
"name": "mendix_runtime_v10.12",
"product_id": "CSAFPID-1637623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10.6",
"product": {
"name": "mendix_runtime_v10.6",
"product_id": "CSAFPID-1637624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10",
"product": {
"name": "mendix_runtime_v10",
"product_id": "CSAFPID-1637622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v8",
"product": {
"name": "mendix_runtime_v8",
"product_id": "CSAFPID-1637625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v9",
"product": {
"name": "mendix_runtime_v9",
"product_id": "CSAFPID-1637626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw672",
"product": {
"name": "ozw672",
"product_id": "CSAFPID-1712832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw772",
"product": {
"name": "ozw772",
"product_id": "CSAFPID-1712833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product_id": "CSAFPID-1712834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product_id": "CSAFPID-1712835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product_id": "CSAFPID-1712836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product_id": "CSAFPID-1712837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product_id": "CSAFPID-1712838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-1615259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1702670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1702671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1637909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1470060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7_port_configuration_tool",
"product": {
"name": "s7_port_configuration_tool",
"product_id": "CSAFPID-1472074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1702672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1712749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1712750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1702677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1702678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1702679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn_",
"product": {
"name": "scalance_m874-3_3g-router__cn_",
"product_id": "CSAFPID-1712751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1712752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1702681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1712753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1702682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1702683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1_",
"product": {
"name": "scalance_mum853-1__a1_",
"product_id": "CSAFPID-1712754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1_",
"product": {
"name": "scalance_mum853-1__b1_",
"product_id": "CSAFPID-1712755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1712756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1_",
"product": {
"name": "scalance_mum856-1__a1_",
"product_id": "CSAFPID-1712757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1_",
"product": {
"name": "scalance_mum856-1__b1_",
"product_id": "CSAFPID-1712758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn_",
"product": {
"name": "scalance_mum856-1__cn_",
"product_id": "CSAFPID-1712759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1702684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1702685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1712760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1712761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product": {
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product_id": "CSAFPID-1613504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product": {
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product_id": "CSAFPID-1613505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product": {
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product_id": "CSAFPID-1613506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product": {
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product_id": "CSAFPID-1613507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product": {
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product_id": "CSAFPID-1613592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product_id": "CSAFPID-1613593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product_id": "CSAFPID-1613594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product_id": "CSAFPID-1613595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product_id": "CSAFPID-1613596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product_id": "CSAFPID-1613597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product_id": "CSAFPID-1613598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-1625339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1637910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1470061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1472069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1637559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1470062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1625340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1470063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1543-1_v4.0",
"product": {
"name": "simatic_cp_1543-1_v4.0",
"product_id": "CSAFPID-1712748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_family",
"product": {
"name": "simatic_mv500_family",
"product_id": "CSAFPID-1703073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc-software",
"product": {
"name": "simatic_net_pc-software",
"product_id": "CSAFPID-1625344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1470064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1637849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1457906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1637850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1457907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1637851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1457908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs",
"product": {
"name": "simatic_pcs",
"product_id": "CSAFPID-838530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1501190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1457909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1637912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1470065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_",
"product": {
"name": "simatic_route_control_",
"product_id": "CSAFPID-1625337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1637856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1470066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager",
"product": {
"name": "simatic_rtls_locating_manager",
"product_id": "CSAFPID-1691398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product_id": "CSAFPID-1703180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product_id": "CSAFPID-1703181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product_id": "CSAFPID-1703182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product_id": "CSAFPID-1703183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product_id": "CSAFPID-1703184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product_id": "CSAFPID-1703185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product_id": "CSAFPID-1703186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product_id": "CSAFPID-1703131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v16",
"product": {
"name": "simatic_s7-plcsim_v16",
"product_id": "CSAFPID-1712825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v17",
"product": {
"name": "simatic_s7-plcsim_v17",
"product_id": "CSAFPID-1712826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v16",
"product": {
"name": "simatic_step_7_safety_v16",
"product_id": "CSAFPID-1703190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v17",
"product": {
"name": "simatic_step_7_safety_v17",
"product_id": "CSAFPID-1703191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v18",
"product": {
"name": "simatic_step_7_safety_v18",
"product_id": "CSAFPID-1500667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v16",
"product": {
"name": "simatic_step_7_v16",
"product_id": "CSAFPID-1703187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v17",
"product": {
"name": "simatic_step_7_v17",
"product_id": "CSAFPID-1703188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v18",
"product": {
"name": "simatic_step_7_v18",
"product_id": "CSAFPID-1703189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1637913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1457855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-75563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1550826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1637914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1457956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1637915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1457957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1637916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1457958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-766087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-1470067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1637917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1457960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1637887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1457961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1501188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1457962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1501192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1457963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-744621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-1470068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v16",
"product": {
"name": "simatic_wincc_unified_v16",
"product_id": "CSAFPID-1703192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v17",
"product": {
"name": "simatic_wincc_unified_v17",
"product_id": "CSAFPID-1703193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v18",
"product": {
"name": "simatic_wincc_unified_v18",
"product_id": "CSAFPID-1703194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v16",
"product": {
"name": "simatic_wincc_v16",
"product_id": "CSAFPID-1702687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v17",
"product": {
"name": "simatic_wincc_v17",
"product_id": "CSAFPID-1702688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v18",
"product": {
"name": "simatic_wincc_v18",
"product_id": "CSAFPID-1703195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1501193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1457965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1501191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1457966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1501189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1457967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v16",
"product": {
"name": "simocode_es_v16",
"product_id": "CSAFPID-1702694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v17",
"product": {
"name": "simocode_es_v17",
"product_id": "CSAFPID-1703196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v18",
"product": {
"name": "simocode_es_v18",
"product_id": "CSAFPID-1703197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp1",
"product": {
"name": "simotion_scout_tia_v5.4_sp1",
"product_id": "CSAFPID-1703198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp3",
"product": {
"name": "simotion_scout_tia_v5.4_sp3",
"product_id": "CSAFPID-1703199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.5_sp1",
"product": {
"name": "simotion_scout_tia_v5.5_sp1",
"product_id": "CSAFPID-1703200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1625341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1470069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v16",
"product": {
"name": "sinamics_startdrive_v16",
"product_id": "CSAFPID-1703201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v17",
"product": {
"name": "sinamics_startdrive_v17",
"product_id": "CSAFPID-1703202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v18",
"product": {
"name": "sinamics_startdrive_v18",
"product_id": "CSAFPID-1703203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-746925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_network_management_system",
"product": {
"name": "sinec_network_management_system",
"product_id": "CSAFPID-1691397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-309392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1458012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1693062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1691473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinema_remote_connect_client",
"product": {
"name": "sinema_remote_connect_client",
"product_id": "CSAFPID-894438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1625342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1470070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1625338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1470071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siport",
"product": {
"name": "siport",
"product_id": "CSAFPID-1712847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v17",
"product": {
"name": "sirius_safety_es_v17",
"product_id": "CSAFPID-1703204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v18",
"product": {
"name": "sirius_safety_es_v18",
"product_id": "CSAFPID-1703205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v17",
"product": {
"name": "sirius_soft_starter_es_v17",
"product_id": "CSAFPID-1703206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v18",
"product": {
"name": "sirius_soft_starter_es_v18",
"product_id": "CSAFPID-1703207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1680248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spectrum_power_7",
"product": {
"name": "spectrum_power_7",
"product_id": "CSAFPID-524281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect",
"product": {
"name": "st7_scadaconnect",
"product_id": "CSAFPID-1691077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product": {
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product_id": "CSAFPID-1703173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic",
"product": {
"name": "telecontrol_server_basic",
"product_id": "CSAFPID-1691051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_1000_v3.1",
"product": {
"name": "telecontrol_server_basic_1000_v3.1",
"product_id": "CSAFPID-1712839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_256_v3.1",
"product": {
"name": "telecontrol_server_basic_256_v3.1",
"product_id": "CSAFPID-1712840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_32_v3.1",
"product": {
"name": "telecontrol_server_basic_32_v3.1",
"product_id": "CSAFPID-1712841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_5000_v3.1",
"product": {
"name": "telecontrol_server_basic_5000_v3.1",
"product_id": "CSAFPID-1712842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_64_v3.1",
"product": {
"name": "telecontrol_server_basic_64_v3.1",
"product_id": "CSAFPID-1712843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_8_v3.1",
"product": {
"name": "telecontrol_server_basic_8_v3.1",
"product_id": "CSAFPID-1712844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_serv_upgr",
"product": {
"name": "telecontrol_server_basic_serv_upgr",
"product_id": "CSAFPID-1712845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_upgr_v3.1",
"product": {
"name": "telecontrol_server_basic_upgr_v3.1",
"product_id": "CSAFPID-1712846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_v3",
"product": {
"name": "telecontrol_server_basic_v3",
"product_id": "CSAFPID-1637855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1625345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1470072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v16",
"product": {
"name": "tia_portal_cloud_v16",
"product_id": "CSAFPID-1712827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v17",
"product": {
"name": "tia_portal_cloud_v17",
"product_id": "CSAFPID-1712828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v18",
"product": {
"name": "tia_portal_cloud_v18",
"product_id": "CSAFPID-1712829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-75533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-1472073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1615531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1458014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1615256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1458015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1615257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1458016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1615258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1458017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1637618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1470073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc",
"product": {
"name": "wincc",
"product_id": "CSAFPID-1625343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc_tia_portal",
"product": {
"name": "wincc_tia_portal",
"product_id": "CSAFPID-465667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500",
"product": {
"name": "simatic_s7-1500",
"product_id": "CSAFPID-715650",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7",
"product": {
"name": "simatic_s7",
"product_id": "CSAFPID-1613729",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1691401",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-715649",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-880853",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808_firmware",
"product": {
"name": "ruggedcom_ape1808_firmware",
"product_id": "CSAFPID-542833",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-540747",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7-1500_tm_mfp",
"product_id": "CSAFPID-1693048",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product_id": "CSAFPID-907212",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_telecontrol_server_basic",
"product": {
"name": "siemens_telecontrol_server_basic",
"product_id": "CSAFPID-907211",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_firmware",
"product": {
"name": "simatic_mv500_firmware",
"product_id": "CSAFPID-1692274",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1472070",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7",
"product": {
"name": "simatic_pcs_7",
"product_id": "CSAFPID-1472067",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1689769",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-766929",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-717239",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-905869",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7",
"product": {
"name": "simatic_step_7",
"product_id": "CSAFPID-879652",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472068",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472066",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472072",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa",
"product": {
"name": "simatic_wincc_oa",
"product_id": "CSAFPID-1472071",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-886176",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165976",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165974",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855582",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855580",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3506",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3341",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3341",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
}
],
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4236",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
}
],
"title": "CVE-2023-4236"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5517",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
}
],
"title": "CVE-2023-5517"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-309392",
"CSAFPID-1703173",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5679",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5679",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
}
],
"title": "CVE-2023-5679"
},
{
"cve": "CVE-2023-5680",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5680",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
}
],
"title": "CVE-2023-5680"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6516",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
}
],
"title": "CVE-2023-6516"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-30584",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30584",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32002",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32003",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
}
],
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32005",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
}
],
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32558",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32736",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
}
],
"title": "CVE-2023-32736"
},
{
"cve": "CVE-2023-38552",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
}
],
"title": "CVE-2023-38552"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39331",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
}
],
"title": "CVE-2023-39331"
},
{
"cve": "CVE-2023-39332",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39332",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
}
],
"title": "CVE-2023-39332"
},
{
"cve": "CVE-2023-39333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39333",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
}
],
"title": "CVE-2023-39333"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45143",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
}
],
"title": "CVE-2023-45143"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46280",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
}
],
"title": "CVE-2023-46280"
},
{
"cve": "CVE-2023-46809",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
}
],
"title": "CVE-2023-46809"
},
{
"cve": "CVE-2023-47038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
}
],
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-47039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47039",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
}
],
"title": "CVE-2023-47039"
},
{
"cve": "CVE-2023-47100",
"references": [
{
"category": "self",
"summary": "CVE-2023-47100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
}
],
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49441",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2023-50387",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
}
],
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-52389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52389",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
}
],
"title": "CVE-2023-52389"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Interpretation Conflict",
"title": "CWE-436"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5594",
"references": [
{
"category": "self",
"summary": "CVE-2024-5594",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-21890",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
}
],
"title": "CVE-2024-21890"
},
{
"cve": "CVE-2024-21891",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
}
],
"title": "CVE-2024-21891"
},
{
"cve": "CVE-2024-21892",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
}
],
"title": "CVE-2024-21892"
},
{
"cve": "CVE-2024-21896",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
}
],
"title": "CVE-2024-21896"
},
{
"cve": "CVE-2024-22017",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
}
],
"title": "CVE-2024-22017"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22025",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
}
],
"title": "CVE-2024-22025"
},
{
"cve": "CVE-2024-24758",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Policy with Untrusted Domains"
},
"notes": [
{
"category": "other",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24758",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
}
],
"title": "CVE-2024-24758"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-24806",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24806",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
}
],
"title": "CVE-2024-24806"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-310",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26306",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26925",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
}
],
"title": "CVE-2024-27980"
},
{
"cve": "CVE-2024-27982",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27982",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
}
],
"title": "CVE-2024-27982"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-28882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-29119",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"product_status": {
"known_affected": [
"CSAFPID-524281"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-524281"
]
}
],
"title": "CVE-2024-29119"
},
{
"cve": "CVE-2024-36140",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
}
],
"title": "CVE-2024-36140"
},
{
"cve": "CVE-2024-44102",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-44102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
}
],
"title": "CVE-2024-44102"
},
{
"cve": "CVE-2024-46888",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46888"
},
{
"cve": "CVE-2024-46889",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46889",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46889"
},
{
"cve": "CVE-2024-46890",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46890"
},
{
"cve": "CVE-2024-46891",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46891"
},
{
"cve": "CVE-2024-46892",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46892"
},
{
"cve": "CVE-2024-46894",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46894",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46894"
},
{
"cve": "CVE-2024-47783",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712847"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47783",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1712847"
]
}
],
"title": "CVE-2024-47783"
},
{
"cve": "CVE-2024-47808",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2024-47808"
},
{
"cve": "CVE-2024-47940",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47940",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47940"
},
{
"cve": "CVE-2024-47941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47941",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47941"
},
{
"cve": "CVE-2024-47942",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47942",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47942"
},
{
"cve": "CVE-2024-50310",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712748"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50310",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712748"
]
}
],
"title": "CVE-2024-50310"
},
{
"cve": "CVE-2024-50313",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50313",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
}
],
"title": "CVE-2024-50313"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50560",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50572"
}
]
}
WID-SEC-W-2024-1433
Vulnerability from csaf_certbund - Published: 2024-06-23 22:00 - Updated: 2025-04-03 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenVPN ist eine Open Source Software zum Aufbau eines Virtuellen Privaten Netzwerkes (VPN) \u00fcber eine verschl\u00fcsselte TLS-Verbindung. Zur Verschl\u00fcsselung werden die Bibliotheken des Programmes OpenSSL benutzt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in OpenVPN ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und erh\u00f6hte Privilegien zu erlangen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1433 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1433.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1433 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1433"
},
{
"category": "external",
"summary": "OpenVPN GitHub vom 2024-06-23",
"url": "https://github.com/OpenVPN/openvpn/blob/v2.6.11/Changes.rst#security-fixes"
},
{
"category": "external",
"summary": "VuXML Security Advisory vom 2024-06-23",
"url": "http://www.vuxml.org/freebsd/142c538e-b18f-40a1-afac-c479effadd5c.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6860-1 vom 2024-07-02",
"url": "https://ubuntu.com/security/notices/USN-6860-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-9376FF0291 vom 2024-07-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-9376ff0291"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3502-1 vom 2024-10-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MKHQ4XCAY5VAP2Q6UDAYNS7OL2QJGLP6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3502-1 vom 2024-10-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKHQ4XCAY5VAP2Q6UDAYNS7OL2QJGLP6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3502-1 vom 2024-10-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019540.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3532-1 vom 2024-10-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019550.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14436-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KIPA7OBR5EVC3PIBCIJICJKK7MH3RBNA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0278-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZFJTYJ5WUHIAH62DRJFZPFUO5RFXILGE/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14707-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4OGKNXNQUPJ2676MEOZA32KDCGPJ5OV7/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4079 vom 2025-03-08",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00005.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7340-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7340-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1053-1 vom 2025-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020625.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1053-2 vom 2025-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020633.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1131-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NCVGL2BNTTQDQ55FP7JRS3YXYIXQP22D/"
}
],
"source_lang": "en-US",
"title": "OpenVPN: Mehrere Schwachstellen erm\u00f6glichen Denial of Service und Privilegieneskalation",
"tracking": {
"current_release_date": "2025-04-03T22:00:00.000+00:00",
"generator": {
"date": "2025-04-04T09:48:38.642+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-1433",
"initial_release_date": "2024-06-23T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-23T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-06T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.6.11",
"product": {
"name": "Open Source OpenVPN \u003c2.6.11",
"product_id": "T035617"
}
},
{
"category": "product_version",
"name": "2.6.11",
"product": {
"name": "Open Source OpenVPN 2.6.11",
"product_id": "T035617-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openvpn:openvpn:2.6.11"
}
}
}
],
"category": "product_name",
"name": "OpenVPN"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28882",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T035617",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-06-23T22:00:00.000+00:00",
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-5594",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T035617",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-06-23T22:00:00.000+00:00",
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-4877",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T035617",
"T000126",
"T027843",
"74185"
]
},
"release_date": "2024-06-23T22:00:00.000+00:00",
"title": "CVE-2024-4877"
}
]
}
ICSA-25-072-10
Vulnerability from csaf_cisa - Published: 2025-03-11 00:00 - Updated: 2025-03-11 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEMA Remote Connect Client before V3.2 SP3 is affected by multiple vulnerabilities.\n\nSiemens has released a new version for SINEMA Remote Connect Client and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-615740.json"
},
{
"category": "self",
"summary": "SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-615740.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-072-10 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-072-10.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-072-10 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-10"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINEMA Remote Connect Client",
"tracking": {
"current_release_date": "2025-03-11T00:00:00.000000Z",
"generator": {
"date": "2025-03-06T09:04:00.000000Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-072-10",
"initial_release_date": "2025-03-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2_SP3",
"product": {
"name": "SINEMA Remote Connect Client",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Client"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1305",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "tap-windows6 driver version 9.26 and earlier does not properly \r\ncheck the size data of incomming write operations which an attacker can \r\nuse to overflow memory buffers, resulting in a bug check and potentially\r\n arbitrary code execution in kernel space",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-1305"
},
{
"cve": "CVE-2024-4877",
"cwe": {
"id": "CWE-420",
"name": "Unprotected Alternate Channel"
},
"notes": [
{
"category": "summary",
"text": "If an attacker with SeImeprsonatePrivilege manages to create a namedpipe server with a name matching that used by the \"Interactive Service\", user interfaces such as OpenVPN-GUI connecting to it could allow the attacker to impersonate the user running the UI.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-4877"
},
{
"cve": "CVE-2024-24974",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-24974"
},
{
"cve": "CVE-2024-27459",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27459"
},
{
"cve": "CVE-2024-27903",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27903"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-28882"
}
]
}
ICSA-24-319-06
Vulnerability from csaf_cisa - Published: 2024-11-12 00:00 - Updated: 2025-05-06 06:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SCALANCE M-800 family before V8.2 is affected by multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-354112.json"
},
{
"category": "self",
"summary": "SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-319-06 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-319-06.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-319-06 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE M-800 Family",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-319-06",
"initial_release_date": "2024-11-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "CSAFPID-0020",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "CSAFPID-0021",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "CSAFPID-0022",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "CSAFPID-0023",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "CSAFPID-0024",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "CSAFPID-0025",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "CSAFPID-0026",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. These functions are not called by OpenSSL itself on untrusted DSA keys so only applications that directly call these functions may be vulnerable. Also vulnerable are the OpenSSL pkey and pkeyparam command line applications when using the `-check` option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"notes": [
{
"category": "summary",
"text": "control channel: refuse control channel messages with nonprintable characters in them. Security scope: a malicious openvpn peer can send garbage to openvpn log, or cause high CPU load",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in \"Everlasting ROBOT: the Marvin Attack\" by Hubert Kario.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026"
]
}
],
"title": "CVE-2024-50572"
}
]
}
ICSA-25-072-02
Vulnerability from csaf_cisa - Published: 2025-03-11 00:00 - Updated: 2025-03-11 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEMA Remote Connect Server before V3.2 SP3 is affected by multiple vulnerabilities.\n\nSiemens has released a new version for SINEMA Remote Connect Server and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-073066.json"
},
{
"category": "self",
"summary": "SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-073066.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-072-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-072-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-072-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINEMA Remote Connect Server",
"tracking": {
"current_release_date": "2025-03-11T00:00:00.000000Z",
"generator": {
"date": "2025-03-06T09:02:00.000000Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-072-02",
"initial_release_date": "2025-03-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2_SP3",
"product": {
"name": "SINEMA Remote Connect Server",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"notes": [
{
"category": "summary",
"text": "control channel: refuse control channel messages with nonprintable characters in them. Security scope: a malicious openvpn peer can send garbage to openvpn log, or cause high CPU load",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-28882"
}
]
}
GSD-2024-28882
Vulnerability from gsd - Updated: 2024-04-02 05:02{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-28882"
],
"id": "GSD-2024-28882",
"modified": "2024-04-02T05:02:55.657933Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-28882",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
CERTFR-2024-AVI-0968
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC WinCC V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC WinCC Unified V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC STEP 7 V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | TIA Portal Cloud V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | SIMATIC WinCC Unified V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | SIMATIC STEP 7 V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC WinCC V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736. | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | TIA Portal Cloud V18 versions antérieures à V4.6.1.0 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736. | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | TIA Portal Cloud V17 versions antérieures à V4.6.0.1 | ||
| Siemens | N/A | SCALANCE M-800 versions antérieures à V8.2 | ||
| Siemens | N/A | SCALANCE S615 versions antérieures à V8.2 | ||
| Siemens | N/A | SIMATIC WinCC Unified V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions supérieures ou égales àV4.0.44 et versions antérieures à V4.0.50 | ||
| Siemens | N/A | SIMATIC STEP 7 V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC WinCC V17 versions antérieures à V17 Update 8 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC WinCC V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V18 versions ant\u00e9rieures \u00e0 V4.6.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V17 versions ant\u00e9rieures \u00e0 V4.6.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M-800 versions ant\u00e9rieures \u00e0 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 versions ant\u00e9rieures \u00e0 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions sup\u00e9rieures ou \u00e9gales \u00e0V4.0.44 et versions ant\u00e9rieures \u00e0 V4.0.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-5594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5594"
},
{
"name": "CVE-2023-32736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32736"
},
{
"name": "CVE-2023-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49441"
},
{
"name": "CVE-2024-50572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50572"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2024-50560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50560"
},
{
"name": "CVE-2024-28882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28882"
},
{
"name": "CVE-2024-50561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50561"
},
{
"name": "CVE-2024-26306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26306"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-50557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50557"
},
{
"name": "CVE-2024-50310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50310"
},
{
"name": "CVE-2024-50558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50558"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-50559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50559"
},
{
"name": "CVE-2023-28450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0968",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-354112",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-654798",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654798.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871035",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-871035.html"
}
]
}
CERTFR-2024-AVI-0968
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC WinCC V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC WinCC Unified V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC STEP 7 V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | TIA Portal Cloud V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | SIMATIC WinCC Unified V17 versions antérieures à V17 Update 8 | ||
| Siemens | N/A | SIMATIC STEP 7 V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | SIMATIC WinCC V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736. | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V16 toutes versions pour la vulnérabilité CVE-2023-32736 | ||
| Siemens | N/A | TIA Portal Cloud V18 versions antérieures à V4.6.1.0 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736. | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | TIA Portal Cloud V17 versions antérieures à V4.6.0.1 | ||
| Siemens | N/A | SCALANCE M-800 versions antérieures à V8.2 | ||
| Siemens | N/A | SCALANCE S615 versions antérieures à V8.2 | ||
| Siemens | N/A | SIMATIC WinCC Unified V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions supérieures ou égales àV4.0.44 et versions antérieures à V4.0.50 | ||
| Siemens | N/A | SIMATIC STEP 7 V18 versions antérieures à V18 Update 5 | ||
| Siemens | N/A | SIMATIC WinCC V17 versions antérieures à V17 Update 8 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC WinCC V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V18 versions ant\u00e9rieures \u00e0 V4.6.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V17 versions ant\u00e9rieures \u00e0 V4.6.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M-800 versions ant\u00e9rieures \u00e0 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 versions ant\u00e9rieures \u00e0 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions sup\u00e9rieures ou \u00e9gales \u00e0V4.0.44 et versions ant\u00e9rieures \u00e0 V4.0.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-5594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5594"
},
{
"name": "CVE-2023-32736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32736"
},
{
"name": "CVE-2023-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49441"
},
{
"name": "CVE-2024-50572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50572"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2024-50560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50560"
},
{
"name": "CVE-2024-28882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28882"
},
{
"name": "CVE-2024-50561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50561"
},
{
"name": "CVE-2024-26306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26306"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-50557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50557"
},
{
"name": "CVE-2024-50310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50310"
},
{
"name": "CVE-2024-50558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50558"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-50559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50559"
},
{
"name": "CVE-2023-28450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0968",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-354112",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-654798",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654798.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871035",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-871035.html"
}
]
}
OPENSUSE-SU-2024:14436-1
Vulnerability from csaf_opensuse - Published: 2024-10-29 00:00 - Updated: 2024-10-29 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "openvpn-2.6.10-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the openvpn-2.6.10-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14436",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14436-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:14436-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIPA7OBR5EVC3PIBCIJICJKK7MH3RBNA/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:14436-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIPA7OBR5EVC3PIBCIJICJKK7MH3RBNA/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28882 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28882/"
}
],
"title": "openvpn-2.6.10-2.1 on GA media",
"tracking": {
"current_release_date": "2024-10-29T00:00:00Z",
"generator": {
"date": "2024-10-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14436-1",
"initial_release_date": "2024-10-29T00:00:00Z",
"revision_history": [
{
"date": "2024-10-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.10-2.1.aarch64",
"product": {
"name": "openvpn-2.6.10-2.1.aarch64",
"product_id": "openvpn-2.6.10-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.6.10-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.10-2.1.aarch64",
"product": {
"name": "openvpn-devel-2.6.10-2.1.aarch64",
"product_id": "openvpn-devel-2.6.10-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.6.10-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.10-2.1.ppc64le",
"product": {
"name": "openvpn-2.6.10-2.1.ppc64le",
"product_id": "openvpn-2.6.10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.10-2.1.ppc64le",
"product": {
"name": "openvpn-devel-2.6.10-2.1.ppc64le",
"product_id": "openvpn-devel-2.6.10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.6.10-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.10-2.1.s390x",
"product": {
"name": "openvpn-2.6.10-2.1.s390x",
"product_id": "openvpn-2.6.10-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.6.10-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.10-2.1.s390x",
"product": {
"name": "openvpn-devel-2.6.10-2.1.s390x",
"product_id": "openvpn-devel-2.6.10-2.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.10-2.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.s390x",
"product_id": "openvpn-down-root-plugin-2.6.10-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.10-2.1.x86_64",
"product": {
"name": "openvpn-2.6.10-2.1.x86_64",
"product_id": "openvpn-2.6.10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.6.10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.10-2.1.x86_64",
"product": {
"name": "openvpn-devel-2.6.10-2.1.x86_64",
"product_id": "openvpn-devel-2.6.10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.10-2.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.6.10-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.10-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.10-2.1.aarch64"
},
"product_reference": "openvpn-2.6.10-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.10-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.10-2.1.ppc64le"
},
"product_reference": "openvpn-2.6.10-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.10-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.10-2.1.s390x"
},
"product_reference": "openvpn-2.6.10-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.10-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-2.6.10-2.1.x86_64"
},
"product_reference": "openvpn-2.6.10-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.10-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.10-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.10-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.10-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.10-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.10-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.s390x"
},
"product_reference": "openvpn-devel-2.6.10-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.10-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.10-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.aarch64"
},
"product_reference": "openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.ppc64le"
},
"product_reference": "openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.s390x"
},
"product_reference": "openvpn-down-root-plugin-2.6.10-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.10-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.x86_64"
},
"product_reference": "openvpn-down-root-plugin-2.6.10-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28882"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28882",
"url": "https://www.suse.com/security/cve/CVE-2024-28882"
},
{
"category": "external",
"summary": "SUSE Bug 1227546 for CVE-2024-28882",
"url": "https://bugzilla.suse.com/1227546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-devel-2.6.10-2.1.x86_64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.aarch64",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.ppc64le",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.s390x",
"openSUSE Tumbleweed:openvpn-down-root-plugin-2.6.10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-28882"
}
]
}
SUSE-SU-2024:3532-1
Vulnerability from csaf_suse - Published: 2024-10-04 14:29 - Updated: 2024-10-04 14:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openvpn",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openvpn fixes the following issues:\n\n- CVE-2024-28882: Fix multiple exit notifications from authenticated clients will extend the validity of a closing session (bsc#1227546) \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3532,SUSE-SLE-SERVER-12-SP5-2024-3532",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3532-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3532-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243532-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3532-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019550.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227546",
"url": "https://bugzilla.suse.com/1227546"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28882 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28882/"
}
],
"title": "Security update for openvpn",
"tracking": {
"current_release_date": "2024-10-04T14:29:54Z",
"generator": {
"date": "2024-10-04T14:29:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3532-1",
"initial_release_date": "2024-10-04T14:29:54Z",
"revision_history": [
{
"date": "2024-10-04T14:29:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.aarch64",
"product": {
"name": "openvpn-2.3.8-16.32.1.aarch64",
"product_id": "openvpn-2.3.8-16.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.aarch64",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.aarch64",
"product_id": "openvpn-devel-2.3.8-16.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.i586",
"product": {
"name": "openvpn-2.3.8-16.32.1.i586",
"product_id": "openvpn-2.3.8-16.32.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.i586",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.i586",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.i586",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.i586",
"product_id": "openvpn-devel-2.3.8-16.32.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.i586",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.i586",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.ppc64le",
"product": {
"name": "openvpn-2.3.8-16.32.1.ppc64le",
"product_id": "openvpn-2.3.8-16.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.ppc64le",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.ppc64le",
"product_id": "openvpn-devel-2.3.8-16.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.s390",
"product": {
"name": "openvpn-2.3.8-16.32.1.s390",
"product_id": "openvpn-2.3.8-16.32.1.s390"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.s390",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.s390",
"product_id": "openvpn-devel-2.3.8-16.32.1.s390"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.s390",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.s390",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.s390x",
"product": {
"name": "openvpn-2.3.8-16.32.1.s390x",
"product_id": "openvpn-2.3.8-16.32.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.s390x",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.s390x",
"product_id": "openvpn-devel-2.3.8-16.32.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.s390x",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.3.8-16.32.1.x86_64",
"product": {
"name": "openvpn-2.3.8-16.32.1.x86_64",
"product_id": "openvpn-2.3.8-16.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.3.8-16.32.1.x86_64",
"product": {
"name": "openvpn-devel-2.3.8-16.32.1.x86_64",
"product_id": "openvpn-devel-2.3.8-16.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.3.8-16.32.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.3.8-16.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.aarch64"
},
"product_reference": "openvpn-2.3.8-16.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.ppc64le"
},
"product_reference": "openvpn-2.3.8-16.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.s390x"
},
"product_reference": "openvpn-2.3.8-16.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.x86_64"
},
"product_reference": "openvpn-2.3.8-16.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.aarch64"
},
"product_reference": "openvpn-2.3.8-16.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.ppc64le"
},
"product_reference": "openvpn-2.3.8-16.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.s390x"
},
"product_reference": "openvpn-2.3.8-16.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.3.8-16.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.x86_64"
},
"product_reference": "openvpn-2.3.8-16.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28882"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28882",
"url": "https://www.suse.com/security/cve/CVE-2024-28882"
},
{
"category": "external",
"summary": "SUSE Bug 1227546 for CVE-2024-28882",
"url": "https://bugzilla.suse.com/1227546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-2.3.8-16.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openvpn-auth-pam-plugin-2.3.8-16.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-04T14:29:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-28882"
}
]
}
SUSE-SU-2024:3502-1
Vulnerability from csaf_suse - Published: 2024-10-01 14:03 - Updated: 2024-10-01 14:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openvpn",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openvpn fixes the following issues:\n\n- CVE-2024-28882: Fix multiple exit notifications from authenticated clients will extend the validity of a closing session (bsc#1227546) \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3502,SUSE-SLE-Module-Basesystem-15-SP6-2024-3502,openSUSE-SLE-15.6-2024-3502",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3502-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3502-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243502-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3502-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-October/037123.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227546",
"url": "https://bugzilla.suse.com/1227546"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28882 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28882/"
}
],
"title": "Security update for openvpn",
"tracking": {
"current_release_date": "2024-10-01T14:03:50Z",
"generator": {
"date": "2024-10-01T14:03:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3502-1",
"initial_release_date": "2024-10-01T14:03:50Z",
"revision_history": [
{
"date": "2024-10-01T14:03:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.3.1.aarch64",
"product": {
"name": "openvpn-2.6.8-150600.3.3.1.aarch64",
"product_id": "openvpn-2.6.8-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"product_id": "openvpn-devel-2.6.8-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.3.1.i586",
"product": {
"name": "openvpn-2.6.8-150600.3.3.1.i586",
"product_id": "openvpn-2.6.8-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.i586",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.i586",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.3.1.i586",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.i586",
"product_id": "openvpn-devel-2.6.8-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.i586",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.i586",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.3.1.ppc64le",
"product": {
"name": "openvpn-2.6.8-150600.3.3.1.ppc64le",
"product_id": "openvpn-2.6.8-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"product_id": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.3.1.s390x",
"product": {
"name": "openvpn-2.6.8-150600.3.3.1.s390x",
"product_id": "openvpn-2.6.8-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.3.1.s390x",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.s390x",
"product_id": "openvpn-devel-2.6.8-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openvpn-2.6.8-150600.3.3.1.x86_64",
"product": {
"name": "openvpn-2.6.8-150600.3.3.1.x86_64",
"product_id": "openvpn-2.6.8-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"product": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"product_id": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"product": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"product_id": "openvpn-devel-2.6.8-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64",
"product": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64",
"product_id": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-2.6.8-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-devel-2.6.8-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64"
},
"product_reference": "openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28882"
}
],
"notes": [
{
"category": "general",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28882",
"url": "https://www.suse.com/security/cve/CVE-2024-28882"
},
{
"category": "external",
"summary": "SUSE Bug 1227546 for CVE-2024-28882",
"url": "https://bugzilla.suse.com/1227546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-auth-pam-plugin-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-devel-2.6.8-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.s390x",
"openSUSE Leap 15.6:openvpn-down-root-plugin-2.6.8-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-01T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-28882"
}
]
}
FKIE_CVE-2024-28882
Vulnerability from fkie_nvd - Published: 2024-07-08 22:15 - Updated: 2025-06-10 16:26{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
"matchCriteriaId": "0D6C4FD9-4627-4A45-89FC-2DB53985C516",
"versionEndExcluding": "2.6.11",
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session"
},
{
"lang": "es",
"value": "OpenVPN 2.6.10 y versiones anteriores en una funci\u00f3n de servidor aceptan m\u00faltiples notificaciones de salida de clientes autenticados que extender\u00e1n la validez de una sesi\u00f3n de cierre"
}
],
"id": "CVE-2024-28882",
"lastModified": "2025-06-10T16:26:09.473",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-07-08T22:15:02.410",
"references": [
{
"source": "security@openvpn.net",
"tags": [
"Vendor Advisory"
],
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
},
{
"source": "security@openvpn.net",
"tags": [
"Mailing List"
],
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
}
],
"sourceIdentifier": "security@openvpn.net",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "security@openvpn.net",
"type": "Secondary"
}
]
}
CVE-2024-28882
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2025-07-08 10:00 - Updated: 2025-07-08 10:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination.",
"urls": [
"https://certvde.com"
]
}
],
"aggregate_severity": {
"namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple Linux component vulnerabilities fixed in latest PLCnext Firmware release 2025.0.2",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of the PLCnext Control might be compromised by attacks using these vulnerabilities.",
"title": "Impact"
},
{
"category": "description",
"text": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"title": "Remediation"
},
{
"category": "general",
"text": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our [application note](https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf).",
"title": "General Recommendation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PCSA-2025/00008",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "Phoenix Contact advisory overview at CERT@VDE",
"url": "https://certvde.com/de/advisories/vendor/phoenixcontact/"
},
{
"category": "external",
"summary": "Phoenix Contact application note",
"url": "https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf"
},
{
"category": "self",
"summary": "VDE-2025-053: Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware - HTML",
"url": "https://certvde.com/en/advisories/VDE-2025-053"
},
{
"category": "self",
"summary": "VDE-2025-053: Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-053.json"
}
],
"title": "Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware",
"tracking": {
"aliases": [
"VDE-2025-053",
"PCSA-2025/00008"
],
"current_release_date": "2025-07-08T10:00:00.000Z",
"generator": {
"date": "2025-06-26T10:14:28.625Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.27"
}
},
"id": "VDE-2025-053",
"initial_release_date": "2025-07-08T10:00:00.000Z",
"revision_history": [
{
"date": "2025-07-08T10:00:00.000Z",
"number": "1",
"summary": "Initial"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC F 1152",
"product": {
"name": "AXC F 1152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 3152",
"product": {
"name": "AXC F 3152",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072S",
"product": {
"name": "RFC 4072S",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
}
},
{
"category": "product_name",
"name": "BPC 9102S",
"product": {
"name": "BPC 9102S",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.0.2",
"product": {
"name": "Firmware \u003c 2025.0.2",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "2025.0.2",
"product": {
"name": "Firmware 2025.0.2",
"product_id": "CSAFPID-22001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Phoenix Contact GmbH \u0026 Co. KG"
}
],
"product_groups": [
{
"group_id": "CSAFGID-61001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-62001",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"summary": "Fixed Product."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c 2025.0.2 installed on AXC F 1152",
"product_id": "CSAFPID-31001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2025.0.2 installed on AXC F 1152",
"product_id": "CSAFPID-32001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c 2025.0.2 installed on AXC F 2152",
"product_id": "CSAFPID-31002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2025.0.2 installed on AXC F 2152",
"product_id": "CSAFPID-32002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c 2025.0.2 installed on AXC F 3152",
"product_id": "CSAFPID-31004",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2025.0.2 installed on AXC F 3152",
"product_id": "CSAFPID-32004",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c 2025.0.2 installed on RFC 4072S",
"product_id": "CSAFPID-31005",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2025.0.2 installed on RFC 4072S",
"product_id": "CSAFPID-32005",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c 2025.0.2 installed on BPC 9102S",
"product_id": "CSAFPID-31007",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2025.0.2 installed on BPC 9102S",
"product_id": "CSAFPID-32007",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11011"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12705",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12705](https://nvd.nist.gov/vuln/detail/CVE-2024-12705)",
"title": "Details"
},
{
"category": "description",
"text": "Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver\u0027s CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12705"
},
{
"cve": "CVE-2025-24965",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-24965](https://nvd.nist.gov/vuln/detail/CVE-2025-24965)",
"title": "Details"
},
{
"category": "description",
"text": "crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.7,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 8.7,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-24965"
},
{
"cve": "CVE-2025-0665",
"cwe": {
"id": "CWE-1341",
"name": "Multiple Releases of Same Resource or Handle"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-0665](https://nvd.nist.gov/vuln/detail/CVE-2025-0665)",
"title": "Details"
},
{
"category": "description",
"text": "libcurl would wrongly close the same eventfd file descriptor twice when taking\ndown a connection channel after having completed a threaded name resolve.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-0665"
},
{
"cve": "CVE-2025-0167",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-0167](https://nvd.nist.gov/vuln/detail/CVE-2025-0167)",
"title": "Details"
},
{
"category": "description",
"text": "When asked to use a `.netrc` file for credentials **and** to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has a `default` entry that\nomits both login and password. A rare circumstance.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"environmentalScore": 3.4,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 3.4,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-0167"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-11053](https://nvd.nist.gov/vuln/detail/CVE-2024-11053)",
"title": "Details"
},
{
"category": "description",
"text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"environmentalScore": 3.4,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 3.4,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-9681",
"cwe": {
"id": "CWE-697",
"name": "Incorrect Comparison"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-9681](https://nvd.nist.gov/vuln/detail/CVE-2024-9681)",
"title": "Details"
},
{
"category": "description",
"text": "When curl is asked to use HSTS, the expiry time for a subdomain might\noverwrite a parent domain\u0027s cache entry, making it end sooner or later than\notherwise intended.\n\nThis affects curl using applications that enable HSTS and use URLs with the\ninsecure `HTTP://` scheme and perform transfers with hosts like\n`x.example.com` as well as `example.com` where the first host is a subdomain\nof the second host.\n\n(The HSTS cache either needs to have been populated manually or there needs to\nhave been previous HTTPS accesses done as the cache needs to have entries for\nthe domains involved to trigger this problem.)\n\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\nbug can make the subdomain\u0027s expiry timeout *bleed over* and get set for the\nparent domain `example.com` in curl\u0027s HSTS cache.\n\nThe result of a triggered bug is that HTTP accesses to `example.com` get\nconverted to HTTPS for a different period of time than what was asked for by\nthe origin server. If `example.com` for example stops supporting HTTPS at its\nexpiry time, curl might then fail to access `http://example.com` until the\n(wrongly set) timeout expires. This bug can also expire the parent\u0027s entry\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\nthan otherwise intended.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-9681"
},
{
"cve": "CVE-2024-0684",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Coreutils: heap overflow in split --line-bytes with very long lines"
},
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-0684](https://nvd.nist.gov/vuln/detail/CVE-2024-0684)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-0684"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-52533](https://nvd.nist.gov/vuln/detail/CVE-2024-52533)",
"title": "Details"
},
{
"category": "description",
"text": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing \u0027\\0\u0027 character.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2020-16120",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "summary",
"text": "Unprivileged overlay + shiftfs read access"
},
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2020-16120](https://nvd.nist.gov/vuln/detail/CVE-2020-16120)",
"title": "Details"
},
{
"category": "description",
"text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.1,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.1,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2020-16120"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-7256](https://nvd.nist.gov/vuln/detail/CVE-2023-7256)",
"title": "Details"
},
{
"category": "description",
"text": "In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 4.4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-8006](https://nvd.nist.gov/vuln/detail/CVE-2024-8006)",
"title": "Details"
},
{
"category": "description",
"text": "Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 4.4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-8176",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-8176](https://nvd.nist.gov/vuln/detail/CVE-2024-8176)",
"title": "Details"
},
{
"category": "description",
"text": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-50602](https://nvd.nist.gov/vuln/detail/CVE-2024-50602)",
"title": "Details"
},
{
"category": "description",
"text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-10918",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-10918](https://nvd.nist.gov/vuln/detail/CVE-2024-10918)",
"title": "Details"
},
{
"category": "description",
"text": "Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an\nunexpected length.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-10918"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12133](https://nvd.nist.gov/vuln/detail/CVE-2024-12133)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2025-27113",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-27113](https://nvd.nist.gov/vuln/detail/CVE-2025-27113)",
"title": "Details"
},
{
"category": "description",
"text": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062)",
"title": "Details"
},
{
"category": "description",
"text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-5742",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"notes": [
{
"category": "summary",
"text": "Nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file"
},
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-5742](https://nvd.nist.gov/vuln/detail/CVE-2024-5742)",
"title": "Details"
},
{
"category": "description",
"text": "A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.7,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.7,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-5742"
},
{
"cve": "CVE-2025-26466",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-26466](https://nvd.nist.gov/vuln/detail/CVE-2025-26466)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-26466"
},
{
"cve": "CVE-2025-26465",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2025-26465](https://nvd.nist.gov/vuln/detail/CVE-2025-26465)",
"title": "Details"
},
{
"category": "description",
"text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2025-26465"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119)",
"title": "Details"
},
{
"category": "description",
"text": "Issue summary: Applications performing certificate name checks (e.g., TLS\nclients checking server certificates) may attempt to read an invalid memory\naddress resulting in abnormal termination of the application process.\n\nImpact summary: Abnormal termination of an application can a cause a denial of\nservice.\n\nApplications performing certificate name checks (e.g., TLS clients checking\nserver certificates) may attempt to read an invalid memory address when\ncomparing the expected name with an `otherName` subject alternative name of an\nX.509 certificate. This may result in an exception that terminates the\napplication program.\n\nNote that basic certificate chain validation (signatures, dates, ...) is not\naffected, the denial of service can occur only when the application also\nspecifies an expected DNS name, Email address or IP address.\n\nTLS servers rarely solicit client certificates, and even when they do, they\ngenerally don\u0027t perform a name check against a reference identifier (expected\nidentity), but rather extract the presented identity after checking the\ncertificate chain. So TLS servers are generally not affected and the severity\nof the issue is Moderate.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)",
"title": "Details"
},
{
"category": "description",
"text": "Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted\nexplicit values for the field polynomial can lead to out-of-bounds memory reads\nor writes.\n\nImpact summary: Out of bound memory writes can lead to an application crash or\neven a possibility of a remote code execution, however, in all the protocols\ninvolving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named\ncurves\" are supported, or, if explicit curve parameters are supported, they\nspecify an X9.62 encoding of binary (GF(2^m)) curves that can\u0027t represent\nproblematic input values. Thus the likelihood of existence of a vulnerable\napplication is low.\n\nIn particular, the X9.62 encoding is used for ECC keys in X.509 certificates,\nso problematic inputs cannot occur in the context of processing X.509\ncertificates. Any problematic use-cases would have to be using an \"exotic\"\ncurve encoding.\n\nThe affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),\nand various supporting BN_GF2m_*() functions.\n\nApplications working with \"exotic\" explicit binary (GF(2^m)) curve parameters,\nthat make it possible to represent invalid field polynomials with a zero\nconstant term, via the above or similar APIs, may terminate abruptly as a\nresult of reading or writing outside of array bounds. Remote code execution\ncannot easily be ruled out.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "SSL_select_next_proto buffer overread"
},
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535)",
"title": "Details"
},
{
"category": "description",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-28882](https://nvd.nist.gov/vuln/detail/CVE-2024-28882)",
"title": "Details"
},
{
"category": "description",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-5594](https://nvd.nist.gov/vuln/detail/CVE-2024-5594)",
"title": "Details"
},
{
"category": "description",
"text": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2019-20633",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2019-20633](https://nvd.nist.gov/vuln/detail/CVE-2019-20633)",
"title": "Details"
},
{
"category": "description",
"text": "GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2019-20633"
},
{
"cve": "CVE-2019-13638",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2019-13638](https://nvd.nist.gov/vuln/detail/CVE-2019-13638)",
"title": "Details"
},
{
"category": "description",
"text": "GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 9.3,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2019-13638"
},
{
"cve": "CVE-2019-13636",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2019-13636](https://nvd.nist.gov/vuln/detail/CVE-2019-13636)",
"title": "Details"
},
{
"category": "description",
"text": "In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2019-13636"
},
{
"cve": "CVE-2018-1000156",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-1000156](https://nvd.nist.gov/vuln/detail/CVE-2018-1000156)",
"title": "Details"
},
{
"category": "description",
"text": "GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD\u0027s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 6.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-1000156"
},
{
"cve": "CVE-2018-20969",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-20969](https://nvd.nist.gov/vuln/detail/CVE-2018-20969)",
"title": "Details"
},
{
"category": "description",
"text": "do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 9.3,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-20969"
},
{
"cve": "CVE-2018-6951",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-6951](https://nvd.nist.gov/vuln/detail/CVE-2018-6951)",
"title": "Details"
},
{
"category": "description",
"text": "An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a \"mangled rename\" issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-6951"
},
{
"cve": "CVE-2018-6952",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-6952](https://nvd.nist.gov/vuln/detail/CVE-2018-6952)",
"title": "Details"
},
{
"category": "description",
"text": "A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-6952"
},
{
"cve": "CVE-2024-9341",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-9341](https://nvd.nist.gov/vuln/detail/CVE-2024-9341)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 8.2,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-9341"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-27043](https://nvd.nist.gov/vuln/detail/CVE-2023-27043)",
"title": "Details"
},
{
"category": "description",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2024-9287",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-9287](https://nvd.nist.gov/vuln/detail/CVE-2024-9287)",
"title": "Details"
},
{
"category": "description",
"text": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren\u0027t activated before being used (ie \"./venv/bin/python\") are not affected.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-9287"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-6232](https://nvd.nist.gov/vuln/detail/CVE-2024-6232)",
"title": "Details"
},
{
"category": "description",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6345",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Remote Code Execution in pypa/setuptools"
},
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-6345](https://nvd.nist.gov/vuln/detail/CVE-2024-6345)",
"title": "Details"
},
{
"category": "description",
"text": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-12084",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12084](https://nvd.nist.gov/vuln/detail/CVE-2024-12084)",
"title": "Details"
},
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12084"
},
{
"cve": "CVE-2024-12085",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12085](https://nvd.nist.gov/vuln/detail/CVE-2024-12085)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12085"
},
{
"cve": "CVE-2024-12086",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12086](https://nvd.nist.gov/vuln/detail/CVE-2024-12086)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.1,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.1,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12086"
},
{
"cve": "CVE-2024-12087",
"cwe": {
"id": "CWE-35",
"name": "Path Traversal: \u0027.../...//\u0027"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12087](https://nvd.nist.gov/vuln/detail/CVE-2024-12087)",
"title": "Details"
},
{
"category": "description",
"text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12087"
},
{
"cve": "CVE-2024-12088",
"cwe": {
"id": "CWE-35",
"name": "Path Traversal: \u0027.../...//\u0027"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12088](https://nvd.nist.gov/vuln/detail/CVE-2024-12088)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12088"
},
{
"cve": "CVE-2024-12747",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-12747](https://nvd.nist.gov/vuln/detail/CVE-2024-12747)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-12747"
},
{
"cve": "CVE-2022-0530",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-0530](https://nvd.nist.gov/vuln/detail/CVE-2022-0530)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2022-0530"
},
{
"cve": "CVE-2022-0529",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-0529](https://nvd.nist.gov/vuln/detail/CVE-2022-0529)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2022-0529"
},
{
"cve": "CVE-2021-4217",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2021-4217](https://nvd.nist.gov/vuln/detail/CVE-2021-4217)",
"title": "Details"
},
{
"category": "description",
"text": "A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.3,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.3,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2021-4217"
},
{
"cve": "CVE-2018-1000035",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-1000035](https://nvd.nist.gov/vuln/detail/CVE-2018-1000035)",
"title": "Details"
},
{
"category": "description",
"text": "A heap-based buffer overflow exists in Info-Zip UnZip version \u003c= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 6.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-1000035"
},
{
"cve": "CVE-2018-18384",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2018-18384](https://nvd.nist.gov/vuln/detail/CVE-2018-18384)",
"title": "Details"
},
{
"category": "description",
"text": "Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2018-18384"
},
{
"cve": "CVE-2016-9844",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2016-9844](https://nvd.nist.gov/vuln/detail/CVE-2016-9844)",
"title": "Details"
},
{
"category": "description",
"text": "Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 2.1,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2016-9844"
},
{
"cve": "CVE-2019-13232",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2019-13232](https://nvd.nist.gov/vuln/detail/CVE-2019-13232)",
"title": "Details"
},
{
"category": "description",
"text": "Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a \"better zip bomb\" issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.3,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 3.3,
"temporalSeverity": "LOW",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
{
"cvss_v2": {
"baseScore": 2.1,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2019-13232"
},
{
"cve": "CVE-2015-7696",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2015-7696](https://nvd.nist.gov/vuln/detail/CVE-2015-7696)",
"title": "Details"
},
{
"category": "description",
"text": "Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"environmentalScore": 6.8,
"integrityImpact": "PARTIAL",
"temporalScore": 6.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2015-7696"
},
{
"cve": "CVE-2015-7697",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2015-7697](https://nvd.nist.gov/vuln/detail/CVE-2015-7697)",
"title": "Details"
},
{
"category": "description",
"text": "Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2015-7697"
},
{
"cve": "CVE-2024-38428",
"cwe": {
"id": "CWE-436",
"name": "Interpretation Conflict"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-38428](https://nvd.nist.gov/vuln/detail/CVE-2024-38428)",
"title": "Details"
},
{
"category": "description",
"text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-10524",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-10524](https://nvd.nist.gov/vuln/detail/CVE-2024-10524)",
"title": "Details"
},
{
"category": "description",
"text": "Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2025.0.2 Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007"
]
}
],
"title": "CVE-2024-10524"
}
]
}
SSA-615740
Vulnerability from csaf_siemens - Published: 2025-03-11 00:00 - Updated: 2025-03-11 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEMA Remote Connect Client before V3.2 SP3 is affected by multiple vulnerabilities.\n\nSiemens has released a new version for SINEMA Remote Connect Client and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-615740.html"
},
{
"category": "self",
"summary": "SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-615740.json"
}
],
"title": "SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3",
"tracking": {
"current_release_date": "2025-03-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-615740",
"initial_release_date": "2025-03-11T00:00:00Z",
"revision_history": [
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.2 SP3",
"product": {
"name": "SINEMA Remote Connect Client",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Client"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1305",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "tap-windows6 driver version 9.26 and earlier does not properly \r\ncheck the size data of incomming write operations which an attacker can \r\nuse to overflow memory buffers, resulting in a bug check and potentially\r\n arbitrary code execution in kernel space",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-1305"
},
{
"cve": "CVE-2024-4877",
"cwe": {
"id": "CWE-420",
"name": "Unprotected Alternate Channel"
},
"notes": [
{
"category": "summary",
"text": "If an attacker with SeImeprsonatePrivilege manages to create a namedpipe server with a name matching that used by the \"Interactive Service\", user interfaces such as OpenVPN-GUI connecting to it could allow the attacker to impersonate the user running the UI.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-4877"
},
{
"cve": "CVE-2024-24974",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-24974"
},
{
"cve": "CVE-2024-27459",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27459"
},
{
"cve": "CVE-2024-27903",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-27903"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-28882"
}
]
}
SSA-354112
Vulnerability from csaf_siemens - Published: 2024-11-12 00:00 - Updated: 2024-11-12 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SCALANCE M-800 family before V8.2 is affected by multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html"
},
{
"category": "self",
"summary": "SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-354112.json"
}
],
"title": "SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2",
"tracking": {
"current_release_date": "2024-11-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-354112",
"initial_release_date": "2024-11-12T00:00:00Z",
"revision_history": [
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "18",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "20",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "21",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "22",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "23",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "24",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "25",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "26",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. These functions are not called by OpenSSL itself on untrusted DSA keys so only applications that directly call these functions may be vulnerable. Also vulnerable are the OpenSSL pkey and pkeyparam command line applications when using the `-check` option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"notes": [
{
"category": "summary",
"text": "control channel: refuse control channel messages with nonprintable characters in them. Security scope: a malicious openvpn peer can send garbage to openvpn log, or cause high CPU load",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in \"Everlasting ROBOT: the Marvin Attack\" by Hubert Kario.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC worker could collect expired objects and get the released commit lock within the same GC sequence. nf_tables_module_autoload() temporarily releases the mutex to load module dependencies, then it goes back to replay the transaction again. Move it at the end of the abort phase after nft_gc_seq_end() is called.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"10",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26"
]
}
],
"title": "CVE-2024-50572"
}
]
}
SSA-073066
Vulnerability from csaf_siemens - Published: 2025-03-11 00:00 - Updated: 2025-03-11 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEMA Remote Connect Server before V3.2 SP3 is affected by multiple vulnerabilities.\n\nSiemens has released a new version for SINEMA Remote Connect Server and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-073066.html"
},
{
"category": "self",
"summary": "SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-073066.json"
}
],
"title": "SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3",
"tracking": {
"current_release_date": "2025-03-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-073066",
"initial_release_date": "2025-03-11T00:00:00Z",
"revision_history": [
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.2 SP3",
"product": {
"name": "SINEMA Remote Connect Server",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5594",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"notes": [
{
"category": "summary",
"text": "control channel: refuse control channel messages with nonprintable characters in them. Security scope: a malicious openvpn peer can send garbage to openvpn log, or cause high CPU load",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2 SP3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976964/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-28882"
}
]
}
GHSA-V34Q-J8XH-HJGX
Vulnerability from github – Published: 2024-07-09 00:31 – Updated: 2024-11-02 00:36OpenVPN 2.6.10 and earlier in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
{
"affected": [],
"aliases": [
"CVE-2024-28882"
],
"database_specific": {
"cwe_ids": [
"CWE-772"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-08T22:15:02Z",
"severity": "MODERATE"
},
"details": "OpenVPN 2.6.10 and earlier in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session",
"id": "GHSA-v34q-j8xh-hjgx",
"modified": "2024-11-02T00:36:20Z",
"published": "2024-07-09T00:31:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28882"
},
{
"type": "WEB",
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
},
{
"type": "WEB",
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.