{"vulnerability": "CVE-2025-20125", "sightings": [{"uuid": "1f9f92b1-993a-45da-bf38-43c8a257f235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://threatintel.cc/2025/02/06/critical-cisco-ise-vulnerabilities-patched.html", "content": "", "creation_timestamp": "2025-02-06T12:24:35.000000Z"}, {"uuid": "826be47b-dfe6-4be0-b20d-5a57bb3665f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhitlrcmdh27", "content": "", "creation_timestamp": "2025-02-06T10:05:59.681102Z"}, {"uuid": "d9a3d23e-13da-436a-8734-081eb127f358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lhiuc3heds2i", "content": "", "creation_timestamp": "2025-02-06T10:18:28.575839Z"}, {"uuid": "3526c8c1-0684-4204-83cb-daf8319e13d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lhjvdb2l3k2z", "content": "", "creation_timestamp": "2025-02-06T20:09:42.479156Z"}, {"uuid": "227037fc-3eaf-486f-bfa2-9542e960ff43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lhjnbvplus2b", "content": "", "creation_timestamp": "2025-02-06T17:45:58.947344Z"}, {"uuid": "e17a9510-0afa-48a0-a9a7-1ea4a103992b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lhj7bqkfx42k", "content": "", "creation_timestamp": "2025-02-06T13:35:08.621620Z"}, {"uuid": "3982e277-068d-4d44-a9ba-68f272f50487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhi5rhh25k2h", "content": "", "creation_timestamp": "2025-02-06T03:35:32.391274Z"}, {"uuid": "7f28a592-5eb4-46f9-a776-daffa7356d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952194437291969", "content": "", "creation_timestamp": "2025-02-05T16:21:38.598923Z"}, {"uuid": "0545fbce-eb96-4dc6-84e7-49b96f293beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113952255128702135", "content": "", "creation_timestamp": "2025-02-05T16:37:05.578968Z"}, {"uuid": "9abcfa79-953e-4584-9f80-350d9da684eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhjpv6zenl2o", "content": "", "creation_timestamp": "2025-02-06T18:32:20.306035Z"}, {"uuid": "ad083f92-4a92-4770-8b79-4946f7947a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://threatintel.cc/2025/02/07/ciscos-ise-bugs-could-allow.html", "content": "", "creation_timestamp": "2025-02-07T12:38:53.000000Z"}, {"uuid": "4a9e4e8b-cd51-4fc8-a7e1-161889d06920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lhiivlvc4c2z", "content": "", "creation_timestamp": "2025-02-06T06:54:41.548463Z"}, {"uuid": "cbc1e515-eb3f-4da2-8f34-19af4c1155ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113952770929328129", "content": "", "creation_timestamp": "2025-02-05T18:48:29.306078Z"}, {"uuid": "891b3cfe-2279-4753-8b27-defe8e1bab01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhesoi7us2w", "content": "", "creation_timestamp": "2025-02-05T20:08:45.913927Z"}, {"uuid": "7ddcc78b-8d37-4053-a6be-572eb1cc1ada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lw54qfuog52r", "content": "", "creation_timestamp": "2025-08-11T15:35:36.817475Z"}, {"uuid": "c07c3c30-fc25-4fe6-a773-71e641cd5a15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113974226972149204", "content": "", "creation_timestamp": "2025-02-09T13:44:53.935865Z"}, {"uuid": "035f1e31-c756-445c-927f-a444244733a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lj4tvywfoo2m", "content": "", "creation_timestamp": "2025-02-27T02:30:09.374022Z"}, {"uuid": "df7ef120-4848-40be-bdaa-5f9797ae9570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwa7hppsno25", "content": "", "creation_timestamp": "2025-08-12T21:02:29.812114Z"}, {"uuid": "fd4ba1bf-cb59-468d-a444-dc128dab2983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://t.me/thehackernews/6296", "content": "\ud83d\uded1 Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely. \n\n\u26a0\ufe0f CVE-2025-20124 &amp; CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.\n\nRead \u2014 https://thehackernews.com/2025/02/cisco-patches-critical-ise.html", "creation_timestamp": "2025-02-06T08:52:45.000000Z"}, {"uuid": "c3af1440-2492-4b95-b593-882b2fdc846d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "published-proof-of-concept", "source": "Telegram/wFoDPO2juTetScN1lMUJrga6MvbS0jfuEP5RLYRBlBKL1Xg", "content": "", "creation_timestamp": "2025-06-16T15:00:08.000000Z"}, {"uuid": "1c708ac6-dd52-44a8-ac0d-372766a796ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://t.me/cvedetector/17312", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20125 - Cisco ISE API Unauthorized Read-Only Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-20125 \nPublished : Feb. 5, 2025, 5:15 p.m. | 49\u00a0minutes ago \nDescription : A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node.  \n  \nThis vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device.  \nNote:\u00a0To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:09:20.000000Z"}, {"uuid": "82e8a90e-2c06-4c66-995b-1046813e14c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://t.me/CyberBulletin/2267", "content": "\u26a1CVE-2025-20124 (CVSS 9.9) &amp; CVE-2025-20125 (CVSS 9.1): Cisco Patches Critical Flaws in Identity Services Engine.\n\n#CyberBulletin", "creation_timestamp": "2025-02-06T12:53:55.000000Z"}, {"uuid": "ac69584f-32ef-471e-adf1-4a6bb6e37213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://t.me/true_secator/6705", "content": "Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430\u00a0\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Identity Services Engine (ISE), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2025-20124\u00a0(CVSS: 9,9) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 Java \u0432 API Cisco ISE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f root \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435.\n\n\u0414\u0440\u0443\u0433\u0430\u044f, CVE-2025-20125\u00a0(CVSS: 9,1), - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 API Cisco ISE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0443\u0437\u043b\u0430 \u0438 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0443\u0437\u0435\u043b.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043b\u044e\u0431\u0443\u044e \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043e\u0431\u044a\u0435\u043a\u0442 Java \u0438\u043b\u0438 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u043d\u0435\u0443\u043a\u0430\u0437\u0430\u043d\u043d\u0443\u044e \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 API, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Cisco, \u043e\u0431\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u044f\u0442 \u0434\u0440\u0443\u0433 \u043e\u0442 \u0434\u0440\u0443\u0433\u0430 \u0438 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0434\u043b\u044f \u0438\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Deloitte \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0432 Cisco ISE 3.0 (\u043f\u0435\u0440\u0435\u0445\u043e\u0434 \u043d\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e), 3.1 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.1P10), 3.2 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.2P7), 3.3 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.3P4) \u0438 3.4 (\u043d\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e).\n\n\u0414\u0430\u043d\u043d\u044b\u043c\u0438 \u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u043c \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Cisco \u043d\u0435 \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442, \u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.", "creation_timestamp": "2025-02-06T12:58:07.000000Z"}, {"uuid": "f73a02ed-7e02-44cd-b49c-bc2b3242f981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20125", "type": "seen", "source": "https://t.me/CybNux/7602", "content": "\u0642\u0627\u0645\u062a \u0634\u0631\u0643\u0629 Cisco \u0644\u0644\u062a\u0648 \u0628\u0625\u0635\u0644\u0627\u062d \u062b\u063a\u0631\u062a\u064a\u0646 \u062e\u0637\u064a\u0631\u062a\u064a\u0646 \u0641\u064a Identity Services Engine (ISE) \u0648\u0627\u0644\u062a\u064a \u0642\u062f \u062a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0648\u062a\u0635\u0639\u064a\u062f \u0627\u0644\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0639\u0646 \u0628\u0639\u062f.\n\n\u26a0\ufe0f CVE-2025-20124 \u0648 CVE-2025-20125 \u062a\u062d\u0645\u0644 \u062f\u0631\u062c\u0627\u062a CVSS 9.9  - 9.1\n\n#\u0623\u062e\u0628\u0627\u0631", "creation_timestamp": "2025-02-07T00:32:58.000000Z"}]}