CVE-2018-5002 (GCVE-0-2018-5002)
Vulnerability from
Published
2018-07-09 19:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Stack-based buffer overflow
Summary
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1827 | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1041058 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/flash-player/apsb18-19.html | x_refsource_MISC | |
https://security.gentoo.org/glsa/201806-02 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/104412 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Adobe Flash Player 29.0.0.171 and earlier versions |
Version: Adobe Flash Player 29.0.0.171 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:18:27.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1827", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1827" }, { "name": "1041058", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041058" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-19.html" }, { "name": "GLSA-201806-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201806-02" }, { "name": "104412", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104412" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-5002", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T21:29:45.687939Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-05-23", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-5002" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:13.994Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-05-23T00:00:00+00:00", "value": "CVE-2018-5002 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Adobe Flash Player 29.0.0.171 and earlier versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Flash Player 29.0.0.171 and earlier versions" } ] } ], "datePublic": "2018-07-09T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02.000Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "RHSA-2018:1827", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1827" }, { "name": "1041058", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041058" }, { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-19.html" }, { "name": "GLSA-201806-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201806-02" }, { "name": "104412", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104412" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2018-5002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Flash Player 29.0.0.171 and earlier versions", "version": { "version_data": [ { "version_value": "Adobe Flash Player 29.0.0.171 and earlier versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1827", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1827" }, { "name": "1041058", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041058" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb18-19.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-19.html" }, { "name": "GLSA-201806-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201806-02" }, { "name": "104412", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104412" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2018-5002", "datePublished": "2018-07-09T19:00:00.000Z", "dateReserved": "2018-01-03T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:13.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4369 (GCVE-0-2023-4369)
Vulnerability from
Published
2023-08-15 17:07
Modified
2025-05-05 15:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Insufficient data validation
Summary
Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-chromeos_25.html" }, { "tags": [ "x_transferred" ], "url": "https://crbug.com/1464456" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-4369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:27:30.555791Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "NVD-CWE-Other", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T15:52:35.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "116.0.5845.120", "status": "affected", "version": "116.0.5845.120", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)" } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient data validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-08T19:39:48.847Z", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-chromeos_25.html" }, { "url": "https://crbug.com/1464456" } ] } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2023-4369", "datePublished": "2023-08-15T17:07:14.872Z", "dateReserved": "2023-08-15T00:03:28.083Z", "dateUpdated": "2025-05-05T15:52:35.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-3659 (GCVE-0-2022-3659)
Vulnerability from
Published
2022-11-01 00:00
Modified
2024-11-12 16:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use after free
Summary
Use after free in Accessibility in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: Medium)
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:03.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html" }, { "tags": [ "x_transferred" ], "url": "https://crbug.com/1355560" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3659", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T16:05:50.065393Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:06:14.949Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "107.0.5304.62", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use after free in Accessibility in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: Medium)" } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-10T00:00:00", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html" }, { "url": "https://crbug.com/1355560" } ] } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2022-3659", "datePublished": "2022-11-01T00:00:00", "dateReserved": "2022-10-21T00:00:00", "dateUpdated": "2024-11-12T16:06:14.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1568 (GCVE-0-2025-1568)
Vulnerability from
Published
2025-04-16 23:06
Modified
2025-05-20 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Code execution
Summary
Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 16063.87.0 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-1568", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:46:13.539057Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-20T14:33:23.211Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "16063.87.0", "status": "affected", "version": "16063.87.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 16063.87.0 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit\u0027s project.config." } ], "problemTypes": [ { "descriptions": [ { "description": "Code execution", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T19:15:07.092Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/374279912" }, { "url": "https://issues.chromium.org/issues/b/374279912" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-1568", "datePublished": "2025-04-16T23:06:28.902Z", "dateReserved": "2025-02-21T22:33:59.174Z", "dateUpdated": "2025-05-20T14:33:23.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-2073 (GCVE-0-2025-2073)
Vulnerability from
Published
2025-04-16 23:06
Modified
2025-05-08 19:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-Bounds Read
Summary
Out-of-Bounds Read in netfilter/ipset in Linux Kernel ChromeOS [6.1, 5.15, 5.10, 5.4, 4.19] allows a local attacker with low privileges to trigger an out-of-bounds read, potentially leading to information disclosure
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-2073", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:47:09.192243Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-07T19:44:40.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "Kernal version 6.1, 5.15. 5.10, 4.19\nchromeOS version 16093.103.0", "status": "affected", "version": "Kernal version 6.1, 5.15. 5.10, 4.19\nchromeOS version 16093.103.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-Bounds Read in netfilter/ipset in Linux Kernel ChromeOS [6.1, 5.15, 5.10, 5.4, 4.19] allows a local attacker with low privileges to trigger an out-of-bounds read, potentially leading to information disclosure" } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-Bounds Read", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T19:15:06.866Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/380043638" }, { "url": "https://issues.chromium.org/issues/b/380043638" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-2073", "datePublished": "2025-04-16T23:06:28.608Z", "dateReserved": "2025-03-06T20:11:52.646Z", "dateUpdated": "2025-05-08T19:15:06.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-2509 (GCVE-0-2025-2509)
Vulnerability from
Published
2025-05-06 00:59
Modified
2025-05-08 19:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Out-of-Bounds Read in Virglrenderer in ChromeOS 16093.57.0 allows a malicious guest VM to achieve arbitrary address access within the crosvm sandboxed process, potentially leading to
VM escape via crafted vertex elements data triggering an out-of-bounds read in util_format_description.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-2509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-07T03:55:46.167Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "16093.57.0", "status": "affected", "version": "16093.57.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-Bounds Read in Virglrenderer in ChromeOS 16093.57.0 allows a malicious guest VM to achieve arbitrary address access within the crosvm sandboxed process, potentially leading to \nVM escape via crafted vertex elements data triggering an out-of-bounds read in util_format_description." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T19:15:07.601Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/385851796" }, { "url": "https://issues.chromium.org/issues/b/385851796" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-2509", "datePublished": "2025-05-06T00:59:32.231Z", "dateReserved": "2025-03-18T20:10:07.777Z", "dateUpdated": "2025-05-08T19:15:07.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6179 (GCVE-0-2025-6179)
Vulnerability from
Published
2025-06-16 16:56
Modified
2025-06-17 14:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Permissions Bypass / Privilege Escalation
Summary
Permissions Bypass in Extension Management in Google ChromeOS 16181.27.0 on managed Chrome devices allows a local attacker to disable extensions and access Developer Mode, including loading additional extensions via exploiting vulnerabilities using the ExtHang3r and ExtPrint3r tools.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-6179", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T13:59:34.942717Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T14:01:39.842Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ChromeOS", "vendor": "Google", "versions": [ { "status": "affected", "version": "16181.27.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Permissions Bypass in Extension Management in Google ChromeOS 16181.27.0 on managed Chrome devices allows a local attacker to disable extensions and access Developer Mode, including loading additional extensions via exploiting vulnerabilities using the ExtHang3r and ExtPrint3r tools." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions Bypass / Privilege Escalation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-16T16:56:37.722Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/399652193" }, { "url": "https://issues.chromium.org/issues/b/399652193" } ], "title": "ChromeOS Extension Disablement and Developer Mode Bypass via ExtHang3r and ExtPrint3r Exploits" } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-6179", "datePublished": "2025-06-16T16:56:37.722Z", "dateReserved": "2025-06-16T16:50:44.449Z", "dateUpdated": "2025-06-17T14:01:39.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1292 (GCVE-0-2025-1292)
Vulnerability from
Published
2025-04-15 19:46
Modified
2025-04-17 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds Write
Summary
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and
bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-1292", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-15T20:23:49.533926Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T19:41:04.480Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ChromeOS", "vendor": "Google", "versions": [ { "status": "affected", "version": "122.0.6261.132", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and \nbypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-15T19:46:26.679Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/324336238" }, { "url": "https://issues.chromium.org/issues/b/324336238" } ], "title": "TPM2 Out-Of-Bounds Write Leading to Potential Operating System Verification Bypass in ChromeOS" } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-1292", "datePublished": "2025-04-15T19:46:26.679Z", "dateReserved": "2025-02-13T23:38:13.495Z", "dateUpdated": "2025-04-17T19:41:04.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6044 (GCVE-0-2025-6044)
Vulnerability from
Published
2025-07-07 18:58
Modified
2025-07-09 18:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Files or Directories Accessible to External Parties
Summary
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-6044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T14:32:43.961731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-08T17:35:37.837Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "16238.64.0", "status": "affected", "version": "16238.64.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature." } ], "problemTypes": [ { "descriptions": [ { "description": "Files or Directories Accessible to External Parties", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-09T18:35:08.612Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/421184743" }, { "url": "https://issues.chromium.org/issues/b/421184743" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-6044", "datePublished": "2025-07-07T18:58:45.456Z", "dateReserved": "2025-06-12T21:41:59.445Z", "dateUpdated": "2025-07-09T18:35:08.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1122 (GCVE-0-2025-1122)
Vulnerability from
Published
2025-04-15 19:51
Modified
2025-05-08 19:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds Write
Summary
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and
Bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-1122", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-15T20:43:27.223049Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T19:40:55.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "15753.50.0", "status": "affected", "version": "15753.50.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and \nBypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T19:15:05.948Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/324336238" }, { "url": "https://issues.chromium.org/issues/b/324336238" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-1122", "datePublished": "2025-04-15T19:51:23.127Z", "dateReserved": "2025-02-07T18:38:22.520Z", "dateUpdated": "2025-05-08T19:15:05.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
displaying 1 - 10 organizations in total 15