Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-45580 (GCVE-0-2024-45580)
Vulnerability from cvelistv5 – Published: 2025-03-03 10:07 – Updated: 2026-02-26 19:09- CWE-416 - Use After Free
| Vendor | Product | Version | |
|---|---|---|---|
| Qualcomm, Inc. | Snapdragon |
Affected:
FastConnect 6900
Affected: FastConnect 7800 Affected: QMP1000 Affected: SDM429W Affected: SM8735 Affected: SM8750 Affected: SM8750P Affected: Snapdragon 429 Mobile Platform Affected: Snapdragon 8 Gen 3 Mobile Platform Affected: Snapdragon AR1 Gen 1 Platform Affected: Snapdragon AR1 Gen 1 Platform "Luna1" Affected: Snapdragon AR2 Gen 1 Platform Affected: SSG2115P Affected: SSG2125P Affected: SXR1230P Affected: SXR2230P Affected: SXR2250P Affected: SXR2330P Affected: WCD9378 Affected: WCD9380 Affected: WCD9385 Affected: WCD9390 Affected: WCD9395 Affected: WCN3620 Affected: WCN3660B Affected: WCN3680B Affected: WCN3980 Affected: WCN7750 Affected: WCN7860 Affected: WCN7861 Affected: WCN7880 Affected: WCN7881 Affected: WSA8830 Affected: WSA8832 Affected: WSA8835 Affected: WSA8840 Affected: WSA8845 Affected: WSA8845H |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-45580",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-05T04:55:15.514671Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:50.431Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Snapdragon Compute",
"Snapdragon Mobile",
"Snapdragon Wearables"
],
"product": "Snapdragon",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "FastConnect 6900"
},
{
"status": "affected",
"version": "FastConnect 7800"
},
{
"status": "affected",
"version": "QMP1000"
},
{
"status": "affected",
"version": "SDM429W"
},
{
"status": "affected",
"version": "SM8735"
},
{
"status": "affected",
"version": "SM8750"
},
{
"status": "affected",
"version": "SM8750P"
},
{
"status": "affected",
"version": "Snapdragon 429 Mobile Platform"
},
{
"status": "affected",
"version": "Snapdragon 8 Gen 3 Mobile Platform"
},
{
"status": "affected",
"version": "Snapdragon AR1 Gen 1 Platform"
},
{
"status": "affected",
"version": "Snapdragon AR1 Gen 1 Platform \"Luna1\""
},
{
"status": "affected",
"version": "Snapdragon AR2 Gen 1 Platform"
},
{
"status": "affected",
"version": "SSG2115P"
},
{
"status": "affected",
"version": "SSG2125P"
},
{
"status": "affected",
"version": "SXR1230P"
},
{
"status": "affected",
"version": "SXR2230P"
},
{
"status": "affected",
"version": "SXR2250P"
},
{
"status": "affected",
"version": "SXR2330P"
},
{
"status": "affected",
"version": "WCD9378"
},
{
"status": "affected",
"version": "WCD9380"
},
{
"status": "affected",
"version": "WCD9385"
},
{
"status": "affected",
"version": "WCD9390"
},
{
"status": "affected",
"version": "WCD9395"
},
{
"status": "affected",
"version": "WCN3620"
},
{
"status": "affected",
"version": "WCN3660B"
},
{
"status": "affected",
"version": "WCN3680B"
},
{
"status": "affected",
"version": "WCN3980"
},
{
"status": "affected",
"version": "WCN7750"
},
{
"status": "affected",
"version": "WCN7860"
},
{
"status": "affected",
"version": "WCN7861"
},
{
"status": "affected",
"version": "WCN7880"
},
{
"status": "affected",
"version": "WCN7881"
},
{
"status": "affected",
"version": "WSA8830"
},
{
"status": "affected",
"version": "WSA8832"
},
{
"status": "affected",
"version": "WSA8835"
},
{
"status": "affected",
"version": "WSA8840"
},
{
"status": "affected",
"version": "WSA8845"
},
{
"status": "affected",
"version": "WSA8845H"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while handling multuple IOCTL calls from userspace for remote invocation."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-03T10:07:30.301Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html"
}
],
"title": "Use After Free in DSP Service"
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2024-45580",
"datePublished": "2025-03-03T10:07:30.301Z",
"dateReserved": "2024-09-02T10:26:15.227Z",
"dateUpdated": "2026-02-26T19:09:50.431Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-45580",
"date": "2026-05-19",
"epss": "0.0016",
"percentile": "0.36434"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-45580\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2025-03-03T11:15:12.763\",\"lastModified\":\"2025-03-06T17:44:23.453\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory corruption while handling multuple IOCTL calls from userspace for remote invocation.\"},{\"lang\":\"es\",\"value\":\"Corrupci\u00f3n de memoria al gestionar m\u00faltiples llamadas IOCTL desde el espacio de usuario para invocaci\u00f3n remota.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E670F500-9B71-4BBE-B5DA-221D35803C89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4960983D-7D32-4AE8-AFF9-22FDEEEA1C11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7074D04-5015-45EA-826B-6E0F85F441EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5298473D-8B34-42E6-BC32-69A3800972B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA414960-717C-4410-8DC0-DCBC2BE9ED2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E52771-4FB7-45DB-A349-4DD911F53752\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E69E56-02B6-46FB-BEBD-B8B7178CD450\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167C1CC1-03F8-49B3-B460-FCA38644DA06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3960C2B5-0754-409B-9374-B0355AA7BE92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84641A8E-A93C-48C1-86AC-193951BA4D78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10804BB9-4B83-4538-B4FE-03D3057EF219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4AC7FF-1A74-4DB8-878B-D28359F6EE45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0C530E-53E7-482B-8522-C632E98E756B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE109312-33AC-47CE-AEF0-E91B288CDA39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1723FB1C-CDAC-4579-AD73-FB992A192153\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB033477-9CBA-4373-84F8-EC51343DA77B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69D9315-2233-4C4E-8651-8E32C4BA5866\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99D121-12DD-4A6E-A4A9-718B2021F9CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB4A33E-6647-447E-BDA3-24246D49C5DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B61B9BC-4A8B-4711-B32C-23BA4350F79E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A146E52D-4AFC-47B4-920F-DAC76077DF25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11BC3C1-993F-42CE-AA2B-41A531CDDCAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA41907C-1CDE-42F3-B21D-5D53B2F06AF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3236D6-0D01-4D05-B580-8888B99BAA5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"508D9A36-1928-44D8-9957-E4281D87301B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6444F6-A477-4B4C-8A09-C22C47CCE45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998FA676-5F4D-4366-B27F-81983A148D9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A93ED1-F509-439E-AE7B-F0EC87AE759F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BD7650-7CF8-4752-89A4-89A917E110F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"568C5B08-AC42-48D3-8029-A65689EEBE75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D80271-D460-47D7-A52E-93D58BB47ABD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320D99BA-0F35-4D6C-BA1F-F17635F91DA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70292B01-617F-44AD-AF77-1AFC1450523D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7866947A-ADE3-432A-81C5-8C51A82929C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92B17201-8185-47F1-9720-5AB4ECD11B22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B47B08-E12E-4846-822E-EB16FE42A181\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896F1C04-9957-440F-BF01-C3772CC3B3DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DDFBF5F-3B2B-45DB-9615-ACD91C750683\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699056F6-1517-4F25-AE07-4FFCF6923B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19928ECE-85EE-4A64-B0BD-780F5CE24327\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99CA230-0694-4898-A06E-9C522CCB86CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B395C76-2E1F-4DF3-9CB5-2762227FED00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB37B5DB-2493-4082-B2BF-60385B7E027C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9799B24D-14FF-4BBA-8B02-2857D242F245\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0755F669-6D7E-454A-95DA-D60FA0696FD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C4B0CC-F50D-4793-B638-2B1C99433B6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C6E9038-9B18-4958-BE1E-215901C9B4B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E9749E-AE29-4C38-A2EE-8D35921E563F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B883C-0F03-4C69-8B4D-C1EC8FE3A198\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB8794F-7998-424E-AF68-E4A4F9310F65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D73AEF-A4E2-4710-A4C1-FEA666490C29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57608D47-894C-4895-B4B3-4733D55D57DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A7DAE3-5844-4112-B93F-3D07880D6AB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63735D33-9F09-4841-9FE0-0D9AB604BECF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EFAA6C2-5370-4281-82A0-058DFEF1DA3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D765C392-5F38-4E6A-9E88-59629E7A6911\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B69595-E488-4590-A150-CE5BE08B5E13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDA6307-9509-41DB-9C34-218816462A08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACAD26E-B79E-4659-91A5-D301281F7D36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBD3ADB-D073-42E5-A8FA-27B19D9058FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80BC68E-7476-4A40-9F48-53722FE9A5BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B026F0-559D-4042-8594-DCF155F58CCF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA33DE15-C177-43B3-AD50-FF797753D12E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109D7C08-566D-4F9D-B706-ADB232C3DB23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B47BF35-3AA0-4667-842E-19B0FE30BF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7CF473-8B25-4851-91F2-1BD693CCDC85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75F541E7-A11E-4403-81E3-D991E4DCA724\"}]}]}],\"references\":[{\"url\":\"https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45580\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-05T04:55:15.514671Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-03T12:27:02.790Z\"}}], \"cna\": {\"title\": \"Use After Free in DSP Service\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Qualcomm, Inc.\", \"product\": \"Snapdragon\", \"versions\": [{\"status\": \"affected\", \"version\": \"FastConnect 6900\"}, {\"status\": \"affected\", \"version\": \"FastConnect 7800\"}, {\"status\": \"affected\", \"version\": \"QMP1000\"}, {\"status\": \"affected\", \"version\": \"SDM429W\"}, {\"status\": \"affected\", \"version\": \"SM8735\"}, {\"status\": \"affected\", \"version\": \"SM8750\"}, {\"status\": \"affected\", \"version\": \"SM8750P\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 429 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 8 Gen 3 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR1 Gen 1 Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR1 Gen 1 Platform \\\"Luna1\\\"\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR2 Gen 1 Platform\"}, {\"status\": \"affected\", \"version\": \"SSG2115P\"}, {\"status\": \"affected\", \"version\": \"SSG2125P\"}, {\"status\": \"affected\", \"version\": \"SXR1230P\"}, {\"status\": \"affected\", \"version\": \"SXR2230P\"}, {\"status\": \"affected\", \"version\": \"SXR2250P\"}, {\"status\": \"affected\", \"version\": \"SXR2330P\"}, {\"status\": \"affected\", \"version\": \"WCD9378\"}, {\"status\": \"affected\", \"version\": \"WCD9380\"}, {\"status\": \"affected\", \"version\": \"WCD9385\"}, {\"status\": \"affected\", \"version\": \"WCD9390\"}, {\"status\": \"affected\", \"version\": \"WCD9395\"}, {\"status\": \"affected\", \"version\": \"WCN3620\"}, {\"status\": \"affected\", \"version\": \"WCN3660B\"}, {\"status\": \"affected\", \"version\": \"WCN3680B\"}, {\"status\": \"affected\", \"version\": \"WCN3980\"}, {\"status\": \"affected\", \"version\": \"WCN7750\"}, {\"status\": \"affected\", \"version\": \"WCN7860\"}, {\"status\": \"affected\", \"version\": \"WCN7861\"}, {\"status\": \"affected\", \"version\": \"WCN7880\"}, {\"status\": \"affected\", \"version\": \"WCN7881\"}, {\"status\": \"affected\", \"version\": \"WSA8830\"}, {\"status\": \"affected\", \"version\": \"WSA8832\"}, {\"status\": \"affected\", \"version\": \"WSA8835\"}, {\"status\": \"affected\", \"version\": \"WSA8840\"}, {\"status\": \"affected\", \"version\": \"WSA8845\"}, {\"status\": \"affected\", \"version\": \"WSA8845H\"}], \"platforms\": [\"Snapdragon Compute\", \"Snapdragon Mobile\", \"Snapdragon Wearables\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Memory corruption while handling multuple IOCTL calls from userspace for remote invocation.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"shortName\": \"qualcomm\", \"dateUpdated\": \"2025-03-03T10:07:30.301Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-45580\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T19:09:50.431Z\", \"dateReserved\": \"2024-09-02T10:26:15.227Z\", \"assignerOrgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"datePublished\": \"2025-03-03T10:07:30.301Z\", \"assignerShortName\": \"qualcomm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que la vulnérabilité CVE-2025-27363 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14 et 15 avant le correctif du 5 mai 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49739"
},
{
"name": "CVE-2025-26428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26428"
},
{
"name": "CVE-2025-26429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26429"
},
{
"name": "CVE-2024-12577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12577"
},
{
"name": "CVE-2025-26425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26425"
},
{
"name": "CVE-2024-49835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49835"
},
{
"name": "CVE-2025-26424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26424"
},
{
"name": "CVE-2025-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21459"
},
{
"name": "CVE-2024-47900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47900"
},
{
"name": "CVE-2024-47891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47891"
},
{
"name": "CVE-2025-26422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26422"
},
{
"name": "CVE-2024-34739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34739"
},
{
"name": "CVE-2025-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0077"
},
{
"name": "CVE-2024-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49846"
},
{
"name": "CVE-2025-26442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26442"
},
{
"name": "CVE-2025-21453",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21453"
},
{
"name": "CVE-2024-49841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49841"
},
{
"name": "CVE-2025-26421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26421"
},
{
"name": "CVE-2024-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52939"
},
{
"name": "CVE-2024-45580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45580"
},
{
"name": "CVE-2025-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26436"
},
{
"name": "CVE-2025-26430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26430"
},
{
"name": "CVE-2024-49847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49847"
},
{
"name": "CVE-2024-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46974"
},
{
"name": "CVE-2025-26435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26435"
},
{
"name": "CVE-2025-26423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26423"
},
{
"name": "CVE-2025-21468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21468"
},
{
"name": "CVE-2025-22425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22425"
},
{
"name": "CVE-2024-49845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49845"
},
{
"name": "CVE-2025-26420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26420"
},
{
"name": "CVE-2024-47896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47896"
},
{
"name": "CVE-2024-46975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46975"
},
{
"name": "CVE-2023-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21342"
},
{
"name": "CVE-2025-21467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21467"
},
{
"name": "CVE-2025-26444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26444"
},
{
"name": "CVE-2024-49842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49842"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0072"
},
{
"name": "CVE-2025-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0087"
},
{
"name": "CVE-2023-35657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35657"
},
{
"name": "CVE-2025-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0427"
},
{
"name": "CVE-2025-26440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26440"
},
{
"name": "CVE-2025-20666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20666"
},
{
"name": "CVE-2025-26438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26438"
},
{
"name": "CVE-2025-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26427"
},
{
"name": "CVE-2025-26426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26426"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2025-27363 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-05-05",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01?hl=fr"
}
]
}
CERTFR-2025-AVI-0371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que la vulnérabilité CVE-2025-27363 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14 et 15 avant le correctif du 5 mai 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49739"
},
{
"name": "CVE-2025-26428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26428"
},
{
"name": "CVE-2025-26429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26429"
},
{
"name": "CVE-2024-12577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12577"
},
{
"name": "CVE-2025-26425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26425"
},
{
"name": "CVE-2024-49835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49835"
},
{
"name": "CVE-2025-26424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26424"
},
{
"name": "CVE-2025-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21459"
},
{
"name": "CVE-2024-47900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47900"
},
{
"name": "CVE-2024-47891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47891"
},
{
"name": "CVE-2025-26422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26422"
},
{
"name": "CVE-2024-34739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34739"
},
{
"name": "CVE-2025-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0077"
},
{
"name": "CVE-2024-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49846"
},
{
"name": "CVE-2025-26442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26442"
},
{
"name": "CVE-2025-21453",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21453"
},
{
"name": "CVE-2024-49841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49841"
},
{
"name": "CVE-2025-26421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26421"
},
{
"name": "CVE-2024-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52939"
},
{
"name": "CVE-2024-45580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45580"
},
{
"name": "CVE-2025-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26436"
},
{
"name": "CVE-2025-26430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26430"
},
{
"name": "CVE-2024-49847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49847"
},
{
"name": "CVE-2024-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46974"
},
{
"name": "CVE-2025-26435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26435"
},
{
"name": "CVE-2025-26423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26423"
},
{
"name": "CVE-2025-21468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21468"
},
{
"name": "CVE-2025-22425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22425"
},
{
"name": "CVE-2024-49845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49845"
},
{
"name": "CVE-2025-26420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26420"
},
{
"name": "CVE-2024-47896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47896"
},
{
"name": "CVE-2024-46975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46975"
},
{
"name": "CVE-2023-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21342"
},
{
"name": "CVE-2025-21467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21467"
},
{
"name": "CVE-2025-26444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26444"
},
{
"name": "CVE-2024-49842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49842"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0072"
},
{
"name": "CVE-2025-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0087"
},
{
"name": "CVE-2023-35657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35657"
},
{
"name": "CVE-2025-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0427"
},
{
"name": "CVE-2025-26440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26440"
},
{
"name": "CVE-2025-20666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20666"
},
{
"name": "CVE-2025-26438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26438"
},
{
"name": "CVE-2025-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26427"
},
{
"name": "CVE-2025-26426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26426"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2025-27363 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-05-05",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01?hl=fr"
}
]
}
FKIE_CVE-2024-45580
Vulnerability from fkie_nvd - Published: 2025-03-03 11:15 - Updated: 2025-03-06 17:44| URL | Tags | ||
|---|---|---|---|
| product-security@qualcomm.com | https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA414960-717C-4410-8DC0-DCBC2BE9ED2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3960C2B5-0754-409B-9374-B0355AA7BE92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A69D9315-2233-4C4E-8651-8E32C4BA5866",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99D121-12DD-4A6E-A4A9-718B2021F9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*",
"matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "572B883C-0F03-4C69-8B4D-C1EC8FE3A198",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*",
"matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while handling multuple IOCTL calls from userspace for remote invocation."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria al gestionar m\u00faltiples llamadas IOCTL desde el espacio de usuario para invocaci\u00f3n remota."
}
],
"id": "CVE-2024-45580",
"lastModified": "2025-03-06T17:44:23.453",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "product-security@qualcomm.com",
"type": "Secondary"
}
]
},
"published": "2025-03-03T11:15:12.763",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "product-security@qualcomm.com",
"type": "Secondary"
}
]
}
GHSA-H3W4-V573-HRPR
Vulnerability from github – Published: 2025-03-03 12:30 – Updated: 2025-03-03 12:30Memory corruption while handling multuple IOCTL calls from userspace for remote invocation.
{
"affected": [],
"aliases": [
"CVE-2024-45580"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-03T11:15:12Z",
"severity": "HIGH"
},
"details": "Memory corruption while handling multuple IOCTL calls from userspace for remote invocation.",
"id": "GHSA-h3w4-v573-hrpr",
"modified": "2025-03-03T12:30:32Z",
"published": "2025-03-03T12:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45580"
},
{
"type": "WEB",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
NCSC-2025-0143
Vulnerability from csaf_ncscnl - Published: 2025-05-07 11:19 - Updated: 2025-05-07 11:19| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. ",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich onderandere in de Keymaster trustlet, SmartManagerCN en FreeType. De kwetsbaarheden stellen een lokale aanvaller in staat om code uit te voeren op het apparaat en code uit te voeren met de rechten van SmartManagerCN. Google meldt informatie te hebben ontvangen dat de kwetsbaarheid met kenmerk CVE-2025-27363 beperkt en gericht als zeroday is misbruikt. Deze kwetsbaarheid bevindt zich in FreeType en stelt een kwaadwillende in staat code uit te voeren middels een heap buffer overflow.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Android 12,13, 14 en 15. Samsung heeft updates uitgebracht om de voor Samsung relevante kwetsbaarheden te verhelpen in Samsung Mobile devices. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Privileges",
"title": "CWE-274"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Privilege Context Switching Error",
"title": "CWE-270"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
},
{
"category": "external",
"summary": "Reference - certbundde; cveprojectv5; nvd",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ncscclear",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=03"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-05-07T11:19:50.517092Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0143",
"initial_release_date": "2025-05-07T11:19:50.517092Z",
"revision_history": [
{
"date": "2025-05-07T11:19:50.517092Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:android/15",
"product": {
"name": "vers:android/15",
"product_id": "CSAFPID-1657641"
}
},
{
"category": "product_version_range",
"name": "vers:android/14",
"product": {
"name": "vers:android/14",
"product_id": "CSAFPID-1657640"
}
},
{
"category": "product_version_range",
"name": "vers:android/13",
"product": {
"name": "vers:android/13",
"product_id": "CSAFPID-1657639"
}
}
],
"category": "product_name",
"name": "System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:android/12",
"product": {
"name": "vers:android/12",
"product_id": "CSAFPID-1657628"
}
}
],
"category": "product_name",
"name": "Framework"
}
],
"category": "vendor",
"name": "Android"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-899411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Samsung Mobile"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-26430",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26430",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26430.json"
}
],
"title": "CVE-2025-26430"
},
{
"cve": "CVE-2025-26435",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26435.json"
}
],
"title": "CVE-2025-26435"
},
{
"cve": "CVE-2025-26436",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26436",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26436.json"
}
],
"title": "CVE-2025-26436"
},
{
"cve": "CVE-2025-26438",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26438",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26438.json"
}
],
"title": "CVE-2025-26438"
},
{
"cve": "CVE-2025-26440",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26440",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26440.json"
}
],
"title": "CVE-2025-26440"
},
{
"cve": "CVE-2025-26442",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26442.json"
}
],
"title": "CVE-2025-26442"
},
{
"cve": "CVE-2025-26444",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26444",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26444.json"
}
],
"title": "CVE-2025-26444"
},
{
"cve": "CVE-2025-27363",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-27363"
},
{
"cve": "CVE-2025-0072",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0072.json"
}
],
"title": "CVE-2025-0072"
},
{
"cve": "CVE-2025-0077",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0077.json"
}
],
"title": "CVE-2025-0077"
},
{
"cve": "CVE-2025-0087",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0087",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0087.json"
}
],
"title": "CVE-2025-0087"
},
{
"cve": "CVE-2025-0427",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0427.json"
}
],
"title": "CVE-2025-0427"
},
{
"cve": "CVE-2023-21342",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-21342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21342.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2023-21342"
},
{
"cve": "CVE-2023-35657",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-35657",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35657.json"
}
],
"title": "CVE-2023-35657"
},
{
"cve": "CVE-2024-12577",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12577.json"
}
],
"title": "CVE-2024-12577"
},
{
"cve": "CVE-2024-34739",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34739",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34739.json"
}
],
"title": "CVE-2024-34739"
},
{
"cve": "CVE-2024-45580",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45580",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45580.json"
}
],
"title": "CVE-2024-45580"
},
{
"cve": "CVE-2024-46974",
"cwe": {
"id": "CWE-274",
"name": "Improper Handling of Insufficient Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Privileges",
"title": "CWE-274"
},
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-46974"
},
{
"cve": "CVE-2024-46975",
"cwe": {
"id": "CWE-270",
"name": "Privilege Context Switching Error"
},
"notes": [
{
"category": "other",
"text": "Privilege Context Switching Error",
"title": "CWE-270"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-46975"
},
{
"cve": "CVE-2024-47891",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47891.json"
}
],
"title": "CVE-2024-47891"
},
{
"cve": "CVE-2024-47896",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47896.json"
}
],
"title": "CVE-2024-47896"
},
{
"cve": "CVE-2024-47900",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47900",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-47900"
},
{
"cve": "CVE-2024-49739",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49739",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49739.json"
}
],
"title": "CVE-2024-49739"
},
{
"cve": "CVE-2024-49835",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49835"
},
{
"cve": "CVE-2024-49841",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49841",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49841.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49841"
},
{
"cve": "CVE-2024-49842",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49842",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49842.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49842"
},
{
"cve": "CVE-2024-49845",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49845",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49845.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49845"
},
{
"cve": "CVE-2024-49846",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49846",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49846.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49846"
},
{
"cve": "CVE-2024-49847",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49847",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49847"
},
{
"cve": "CVE-2024-52939",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52939",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52939.json"
}
],
"title": "CVE-2024-52939"
},
{
"cve": "CVE-2025-20666",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20666",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20666.json"
}
],
"title": "CVE-2025-20666"
},
{
"cve": "CVE-2025-21453",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21453",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21453.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21453"
},
{
"cve": "CVE-2025-21459",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21459",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21459.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21459"
},
{
"cve": "CVE-2025-21467",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21467"
},
{
"cve": "CVE-2025-21468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21468",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21468.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21468"
},
{
"cve": "CVE-2025-22425",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22425.json"
}
],
"title": "CVE-2025-22425"
},
{
"cve": "CVE-2025-26420",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26420",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26420.json"
}
],
"title": "CVE-2025-26420"
},
{
"cve": "CVE-2025-26421",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26421",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26421.json"
}
],
"title": "CVE-2025-26421"
},
{
"cve": "CVE-2025-26422",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26422",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26422.json"
}
],
"title": "CVE-2025-26422"
},
{
"cve": "CVE-2025-26423",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26423",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26423.json"
}
],
"title": "CVE-2025-26423"
},
{
"cve": "CVE-2025-26424",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26424",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26424.json"
}
],
"title": "CVE-2025-26424"
},
{
"cve": "CVE-2025-26425",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26425.json"
}
],
"title": "CVE-2025-26425"
},
{
"cve": "CVE-2025-26426",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26426.json"
}
],
"title": "CVE-2025-26426"
},
{
"cve": "CVE-2025-26427",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26427.json"
}
],
"title": "CVE-2025-26427"
},
{
"cve": "CVE-2025-26428",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26428.json"
}
],
"title": "CVE-2025-26428"
},
{
"cve": "CVE-2025-26429",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26429",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26429.json"
}
],
"title": "CVE-2025-26429"
}
]
}
WID-SEC-W-2025-0937
Vulnerability from csaf_certbund - Published: 2025-05-05 22:00 - Updated: 2025-05-05 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um erh\u00f6hte Privilegien zu erlangen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben oder andere nicht spezifizierte Angriffe auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0937 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0937.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0937 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0937"
},
{
"category": "external",
"summary": "Android Patchday Mai 2025 vom 2025-05-05",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
}
],
"source_lang": "en-US",
"title": "Android Patchday Mai 2025: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-05T22:00:00.000+00:00",
"generator": {
"date": "2025-05-06T08:38:45.660+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0937",
"initial_release_date": "2025-05-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "13 \u003c2025-05-05",
"product": {
"name": "Google Android 13 \u003c2025-05-05",
"product_id": "T043355"
}
},
{
"category": "product_version",
"name": "13 2025-05-05",
"product": {
"name": "Google Android 13 2025-05-05",
"product_id": "T043355-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:13__2025-05-05"
}
}
},
{
"category": "product_version_range",
"name": "14 \u003c2025-05-05",
"product": {
"name": "Google Android 14 \u003c2025-05-05",
"product_id": "T043356"
}
},
{
"category": "product_version",
"name": "14 2025-05-05",
"product": {
"name": "Google Android 14 2025-05-05",
"product_id": "T043356-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:14__2025-05-05"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003c2025-05-05",
"product": {
"name": "Google Android 15 \u003c2025-05-05",
"product_id": "T043357"
}
},
{
"category": "product_version",
"name": "15 2025-05-05",
"product": {
"name": "Google Android 15 2025-05-05",
"product_id": "T043357-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:15__2025-05-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21342",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2023-21342"
},
{
"cve": "CVE-2023-35657",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2023-35657"
},
{
"cve": "CVE-2024-12577",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-12577"
},
{
"cve": "CVE-2024-34739",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-34739"
},
{
"cve": "CVE-2024-45580",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-45580"
},
{
"cve": "CVE-2024-46974",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-46974"
},
{
"cve": "CVE-2024-46975",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-46975"
},
{
"cve": "CVE-2024-47891",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47891"
},
{
"cve": "CVE-2024-47896",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47896"
},
{
"cve": "CVE-2024-47900",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47900"
},
{
"cve": "CVE-2024-49739",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49739"
},
{
"cve": "CVE-2024-49835",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49835"
},
{
"cve": "CVE-2024-49841",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49841"
},
{
"cve": "CVE-2024-49842",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49842"
},
{
"cve": "CVE-2024-49845",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49845"
},
{
"cve": "CVE-2024-49846",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49846"
},
{
"cve": "CVE-2024-49847",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49847"
},
{
"cve": "CVE-2024-52939",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-52939"
},
{
"cve": "CVE-2025-0072",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0072"
},
{
"cve": "CVE-2025-0077",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0077"
},
{
"cve": "CVE-2025-0087",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0087"
},
{
"cve": "CVE-2025-0427",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0427"
},
{
"cve": "CVE-2025-20666",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-20666"
},
{
"cve": "CVE-2025-21453",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21453"
},
{
"cve": "CVE-2025-21459",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21459"
},
{
"cve": "CVE-2025-21467",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21467"
},
{
"cve": "CVE-2025-21468",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21468"
},
{
"cve": "CVE-2025-22425",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-22425"
},
{
"cve": "CVE-2025-26420",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26420"
},
{
"cve": "CVE-2025-26421",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26421"
},
{
"cve": "CVE-2025-26422",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26422"
},
{
"cve": "CVE-2025-26423",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26423"
},
{
"cve": "CVE-2025-26424",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26424"
},
{
"cve": "CVE-2025-26425",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26425"
},
{
"cve": "CVE-2025-26426",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26426"
},
{
"cve": "CVE-2025-26427",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26427"
},
{
"cve": "CVE-2025-26428",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26428"
},
{
"cve": "CVE-2025-26429",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26429"
},
{
"cve": "CVE-2025-26430",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26430"
},
{
"cve": "CVE-2025-26435",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26435"
},
{
"cve": "CVE-2025-26436",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26436"
},
{
"cve": "CVE-2025-26438",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26438"
},
{
"cve": "CVE-2025-26440",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26440"
},
{
"cve": "CVE-2025-26442",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26442"
},
{
"cve": "CVE-2025-26444",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26444"
},
{
"cve": "CVE-2025-27363",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-27363"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.