{"vulnerability": "CVE-2025-0327", "sightings": [{"uuid": "5169ecdd-88bc-4433-ba51-eebe33df708a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-079-01", "content": "", "creation_timestamp": "2025-03-20T11:00:00.000000Z"}, {"uuid": "3e4c9666-e549-4964-a682-efdcba4cbe96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113995183863446510", "content": "", "creation_timestamp": "2025-02-13T06:34:25.378212Z"}, {"uuid": "dbfd70d9-6767-4840-aca0-27f30cd4d6d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li25ddg5sl2x", "content": "", "creation_timestamp": "2025-02-13T07:15:28.982955Z"}, {"uuid": "68f8b7a4-9759-4451-903d-772d372d3fbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li2i7xhbvk22", "content": "", "creation_timestamp": "2025-02-13T10:30:27.490453Z"}, {"uuid": "8b61a8eb-b342-4686-856d-8496e114e451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://t.me/cvedetector/17982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0327 - Apache Server Windows Service Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0327 \nPublished : Feb. 13, 2025, 7:15 a.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit  \ntrail data and the other acting as server managing client request) that could cause a loss of Confidentiality,  \nIntegrity and Availability of engineering workstation when an attacker with standard privilege modifies the  \nexecutable path of the windows services. To be exploited, services need to be restarted. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T11:18:30.000000Z"}, {"uuid": "c4f44c0f-d8d6-4142-94c6-4970fd10a1e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0327\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit\ntrail data and the other acting as server managing client request) that could cause a loss of Confidentiality,\nIntegrity and Availability of engineering workstation when an attacker with standard privilege modifies the\nexecutable path of the windows services. To be exploited, services need to be restarted.\n\ud83d\udccf Published: 2025-02-13T09:31:26Z\n\ud83d\udccf Modified: 2025-02-13T09:31:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0327\n2. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-03&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-042-03.pdf", "creation_timestamp": "2025-02-13T10:09:11.000000Z"}, {"uuid": "5dc6a2d1-62f3-4af2-89c4-0ffd10f7911f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "Telegram/qj-WOD_Rl2Wm-gy2laxUipdaBjMeXug_e8ejl9jGCHI-kxHP", "content": "", "creation_timestamp": "2025-02-14T10:06:09.000000Z"}, {"uuid": "3bcc6d3f-8cef-4500-9af0-f0fea99954b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "Telegram/rku_lDFM50Y2tsB8sOK5kFmdDaTBp5BPVD7jmWhsBckzAZY", "content": "", "creation_timestamp": "2025-02-13T08:02:30.000000Z"}, {"uuid": "b3b76462-704b-4f13-ad7b-939e336f15d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "Telegram/6FKcA-FsJ8oX18nnojMaQq5TkYHy4-90wtvw1J5jFsjNocin", "content": "", "creation_timestamp": "2025-02-14T10:08:08.000000Z"}]}