Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-47809 (GCVE-0-2025-47809)
Vulnerability from cvelistv5
- CWE-272 - Least Privilege Violation
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-47809",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-16T13:35:54.604112Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-16T13:36:00.498Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CodeMeter",
"vendor": "Wibu",
"versions": [
{
"lessThan": "8.30a",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.30a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-272",
"description": "CWE-272 Least Privilege Violation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-16T00:18:40.444Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.wibu.com/support/security-advisories/wibu-100120.html"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-47809",
"datePublished": "2025-05-16T00:00:00.000Z",
"dateReserved": "2025-05-10T00:00:00.000Z",
"dateUpdated": "2025-05-16T13:36:00.498Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-47809\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-05-16T01:15:51.827\",\"lastModified\":\"2025-05-16T14:42:18.700\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.\"},{\"lang\":\"es\",\"value\":\"Las versiones anteriores a la versi\u00f3n 8.30a de Wibu CodeMeter a veces permiten la escalada de privilegios inmediatamente despu\u00e9s de la instalaci\u00f3n (antes de cerrar sesi\u00f3n o reiniciar). Para que esto ocurra, debe haber una instalaci\u00f3n sin privilegios con Control de cuentas de usuario (UAC), y el componente CodeMeter Control Center debe estar instalado y no debe haberse reiniciado. En este caso, el usuario local puede acceder desde Importar licencia a una instancia privilegiada del Explorador de Windows.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-272\"}]}],\"references\":[{\"url\":\"https://www.wibu.com/support/security-advisories/wibu-100120.html\",\"source\":\"cve@mitre.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-47809\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-16T13:35:54.604112Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-16T13:35:57.872Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Wibu\", \"product\": \"CodeMeter\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.30a\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.wibu.com/support/security-advisories/wibu-100120.html\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-272\", \"description\": \"CWE-272 Least Privilege Violation\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"8.30a\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-05-16T00:18:40.444Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-47809\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-16T13:36:00.498Z\", \"dateReserved\": \"2025-05-10T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-05-16T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ssa-201595
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Versions V5.0 through V8 of the Desigo CC product family (Desigo CC, Desigo CC Compact, Desigo CC Connect, Cerberus DMS), as well as the Desigo CC-based SENTRON Powermanager, are affected by a vulnerability in the underlying third-party component WIBU Systems CodeMeter Runtime. Successful exploitation of this vulnerability could allow privilege escalation.\n\nSiemens has released instructions how to update the CodeMeter Runtime component and recommends to apply the update on affected systems.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-201595.html"
},
{
"category": "self",
"summary": "SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-201595.json"
}
],
"title": "SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager",
"tracking": {
"current_release_date": "2025-08-19T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-201595",
"initial_release_date": "2025-08-14T00:00:00Z",
"revision_history": [
{
"date": "2025-08-14T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-08-19T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Clarified that updating WIBU CodeMeter to a later version than V8.30a (currently available: V8.40) will also fix the issue"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V5.0",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Desigo CC family V5.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V5.1",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Desigo CC family V5.1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V6",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "Desigo CC family V6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V7",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "Desigo CC family V7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V8",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "Desigo CC family V8"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V5",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V6",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V7",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V8",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V8"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-272",
"name": "Least Privilege Violation"
},
"notes": [
{
"category": "summary",
"text": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Apply patch as documented in section \u0027Additional Information\u0027",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9"
]
}
],
"title": "CVE-2025-47809"
}
]
}
ssa-331739
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "WIBU Systems published information about a privilege escalation vulnerability under a certain circumstances and associated fix releases of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens industrial products.\n\nSiemens has released new versions for affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
},
{
"category": "self",
"summary": "SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-331739.json"
}
],
"title": "SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products",
"tracking": {
"current_release_date": "2025-09-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-331739",
"initial_release_date": "2025-08-12T00:00:00Z",
"revision_history": [
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-09-09T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed Simatic Information Server and Simatic Process Historian as they are not affected."
}
],
"status": "interim",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC PDM Maintenance Station V5.0",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC PDM Maintenance Station V5.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.18 P032",
"product": {
"name": "SIMATIC WinCC OA V3.18",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.19 P020",
"product": {
"name": "SIMATIC WinCC OA V3.19",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.20 P008",
"product": {
"name": "SIMATIC WinCC OA V3.20",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.20"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-272",
"name": "Least Privilege Violation"
},
"notes": [
{
"category": "summary",
"text": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.18 P032 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109994004/"
},
{
"category": "vendor_fix",
"details": "Update to V3.19 P020 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989640/"
},
{
"category": "vendor_fix",
"details": "Update to V3.20 P008 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109990967/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2025-47809"
}
]
}
sca-2025-0014
Vulnerability from csaf_sick
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the CodeMeter runtime affects the SICK products SICK CODE-LOC and SICK LIDAR-LOC. This could potentially affect the integrity, confidentiality and availability of the products. Only systems running on Microsoft Windows are affected. Furthermore, the systems are only affected when running the installation and keeping the Control Center component open. As soon as the system has been restarted, it is no longer affected by the vulnerability.\nNevertheless, SICK strongly recommends to upgrade to the latest version of the products to mitigate the risk. Currently, SICK is not aware of any public exploits. ",
"title": "summary"
},
{
"category": "general",
"text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.",
"title": "General Security Measures"
},
{
"category": "general",
"text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
"title": "Vulnerability Classification"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@sick.de",
"issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
"name": "SICK PSIRT",
"namespace": "https://www.sick.com/psirt"
},
"references": [
{
"summary": "SICK PSIRT Security Advisories",
"url": "https://sick.com/psirt"
},
{
"summary": "SICK Operating Guidelines",
"url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
},
{
"summary": "ICS-CERT recommended practices on Industrial Security",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"summary": "CVSS v3.1 Calculator",
"url": "https://www.first.org/cvss/calculator/3.1"
},
{
"category": "self",
"summary": "The canonical URL.",
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0014.json"
}
],
"title": "CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC",
"tracking": {
"current_release_date": "2025-11-03T14:00:00.000Z",
"generator": {
"date": "2025-10-23T07:49:55.780Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.38"
}
},
"id": "SCA-2025-0014",
"initial_release_date": "2025-11-03T11:00:00.000Z",
"revision_history": [
{
"date": "2025-11-03T14:00:00.000Z",
"number": "1",
"summary": "Initial version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK CODE-LOC all versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "CODE-LOC"
}
],
"category": "product_family",
"name": "CODE-LOC"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK LIDAR-LOC all versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "LIDAR-LOC"
}
],
"category": "product_family",
"name": "LIDAR-LOC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c LLS-2.8.1.24092R",
"product": {
"name": "SICK CODE-LOC firmware \u003c LLS-2.8.1.24092R",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version",
"name": "LLS-2.8.1.24092R",
"product": {
"name": "SICK CODE-LOC firmware LLS-2.8.1.24092R",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "CODE-LOC firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c LLS-2.8.1.24092R",
"product": {
"name": "SICK LIDAR-LOC firmware \u003c LLS-2.8.1.24092R",
"product_id": "CSAFPID-0005"
}
},
{
"category": "product_version",
"name": "LLS-2.8.1.24092R",
"product": {
"name": "SICK LIDAR-LOC firmware LLS-2.8.1.24092R",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "LIDAR-LOC firmware"
}
],
"category": "vendor",
"name": "SICK AG"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "SICK CODE-LOC with Firmware \u003c LLS-2.8.1.24092R",
"product_id": "CSAFPID-0007"
},
"product_reference": "CSAFPID-0003",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK LIDAR-LOC with Firmware \u003c LLS-2.8.1.24092R",
"product_id": "CSAFPID-0008"
},
"product_reference": "CSAFPID-0005",
"relates_to_product_reference": "CSAFPID-0002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK CODE-LOC all versions with Firmware LLS-2.8.1.24092R",
"product_id": "CSAFPID-0009"
},
"product_reference": "CSAFPID-0004",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK LIDAR-LOC all versions with Firmware LLS-2.8.1.24092R",
"product_id": "CSAFPID-0010"
},
"product_reference": "CSAFPID-0006",
"relates_to_product_reference": "CSAFPID-0002"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"title": "Summary"
}
],
"product_status": {
"fixed": [
"CSAFPID-0009",
"CSAFPID-0010"
],
"known_affected": [
"CSAFPID-0007",
"CSAFPID-0008"
],
"recommended": [
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "On Microsoft Windows systems, it is strongly recommended to upgrade to the latest version (LLS-2.8.1.24092R).",
"product_ids": [
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"temporalScore": 7.7,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"title": "Privilege Escalation Through CodeMeter Installer on Windows"
}
]
}
fkie_cve-2025-47809
Vulnerability from fkie_nvd
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer."
},
{
"lang": "es",
"value": "Las versiones anteriores a la versi\u00f3n 8.30a de Wibu CodeMeter a veces permiten la escalada de privilegios inmediatamente despu\u00e9s de la instalaci\u00f3n (antes de cerrar sesi\u00f3n o reiniciar). Para que esto ocurra, debe haber una instalaci\u00f3n sin privilegios con Control de cuentas de usuario (UAC), y el componente CodeMeter Control Center debe estar instalado y no debe haberse reiniciado. En este caso, el usuario local puede acceder desde Importar licencia a una instancia privilegiada del Explorador de Windows."
}
],
"id": "CVE-2025-47809",
"lastModified": "2025-05-16T14:42:18.700",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "cve@mitre.org",
"type": "Secondary"
}
]
},
"published": "2025-05-16T01:15:51.827",
"references": [
{
"source": "cve@mitre.org",
"url": "https://www.wibu.com/support/security-advisories/wibu-100120.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-272"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
ncsc-2025-0246
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als SIMATIC, SINEC, SIMAC, RUGGEDCOM, SIMOTION, SINAMICS, SIPROTEC en SINUMERIK.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Cross-Site Scripting\n* Manipulatie van gegevens\n* Omzeilen van een beveiligingsmaatregel \n* (Remote) code execution (SYSTEM rechten) \n* (Remote) code execution (Gebruikersrechten)\n* Toegang tot gevoelige gegevens\n* Verhogen van rechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Multiple Releases of Same Resource or Handle",
"title": "CWE-1341"
},
{
"category": "general",
"text": "Irrelevant Code",
"title": "CWE-1164"
},
{
"category": "general",
"text": "Least Privilege Violation",
"title": "CWE-272"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Execution with Unnecessary Privileges",
"title": "CWE-250"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-094954.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-177847.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-186293.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-282044.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493396.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493787.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-517338.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-665108.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-674084.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-707630.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-894058.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-08-12T13:03:08.211775Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0246",
"initial_release_date": "2025-08-12T13:03:08.211775Z",
"revision_history": [
{
"date": "2025-08-12T13:03:08.211775Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046293"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046294"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046295"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046296"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046297"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046298"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046299"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046300"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046301"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046302"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046303"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046192"
}
}
],
"category": "product_name",
"name": "SIMATIC Automation Tool"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046193"
}
}
],
"category": "product_name",
"name": "SIMATIC Automation Tool SDK Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046194"
}
}
],
"category": "product_name",
"name": "SIMATIC BATCH V10.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296857"
}
}
],
"category": "product_name",
"name": "SIMATIC BATCH V9.1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046195"
}
}
],
"category": "product_name",
"name": "SIMATIC Control Function Library (CFL) V1.0.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046196"
}
}
],
"category": "product_name",
"name": "SIMATIC Control Function Library (CFL) V2.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046197"
}
}
],
"category": "product_name",
"name": "SIMATIC Control Function Library (CFL) V3.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046198"
}
}
],
"category": "product_name",
"name": "SIMATIC Control Function Library (CFL) V4.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046204"
}
}
],
"category": "product_name",
"name": "SIMATIC Energy Suite V17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046205"
}
}
],
"category": "product_name",
"name": "SIMATIC Energy Suite V18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046206"
}
}
],
"category": "product_name",
"name": "SIMATIC Energy Suite V19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046207"
}
}
],
"category": "product_name",
"name": "SIMATIC Logon V1.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046208"
}
}
],
"category": "product_name",
"name": "SIMATIC Logon V2.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046212"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP CREATOR V3.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046213"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP CREATOR V4.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046211"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP CREATOR\u00a0V2.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046214"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP CREATOR\u00a0V5.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046215"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP Integrator V1.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046216"
}
}
],
"category": "product_name",
"name": "SIMATIC MTP Integrator V2.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046209"
}
}
],
"category": "product_name",
"name": "SIMATIC Management Agent"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046210"
}
}
],
"category": "product_name",
"name": "SIMATIC Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1426215"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V16"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296547"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046217"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046218"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.0",
"product": {
"name": "vers:unknown/\u003cv4.0",
"product_id": "CSAFPID-2963002"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046325"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv3.0",
"product": {
"name": "vers:unknown/\u003cv3.0",
"product_id": "CSAFPID-3046324"
}
}
],
"category": "product_name",
"name": "SINEC Traffic Analyzer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3045960"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT TIA V5.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3045961"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT TIA V5.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv5.6sp1hf7",
"product": {
"name": "vers:unknown/\u003cv5.6sp1hf7",
"product_id": "CSAFPID-3045962"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT TIA V5.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046175"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv5.7sp1hf1",
"product": {
"name": "vers:unknown/\u003cv5.7sp1hf1",
"product_id": "CSAFPID-3046304"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT TIA V5.7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046305"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT V5.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-3046306"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT V5.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv5.6sp1hf7",
"product": {
"name": "vers:unknown/\u003cv5.6sp1hf7",
"product_id": "CSAFPID-3046307"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT V5.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv5.7sp1hf1",
"product": {
"name": "vers:unknown/\u003cv5.7sp1hf1",
"product_id": "CSAFPID-3046308"
}
}
],
"category": "product_name",
"name": "SIMOTION SCOUT V5.7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045854"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD84 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045855"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045856"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045857"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD89 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045858"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045859"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7KE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045860"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045861"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045862"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045863"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045864"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045865"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045866"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ81 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045867"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045868"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045869"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045870"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045871"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045872"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045873"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045874"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045875"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SS85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045876"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045877"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045878"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045879"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045880"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SY82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045881"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UM85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045882"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045883"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045884"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045885"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045886"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/v7.80|\u003cv10.0",
"product": {
"name": "vers:unknown/v7.80|\u003cv10.0",
"product_id": "CSAFPID-3045887"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VK87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045888"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.0",
"product": {
"name": "vers:unknown/\u003cv10.0",
"product_id": "CSAFPID-3045889"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 Compact 7SX800 (CP050)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.95sp5",
"product": {
"name": "vers:unknown/\u003cv4.95sp5",
"product_id": "CSAFPID-3046312"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D PPU.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv5.25sp1",
"product": {
"name": "vers:unknown/\u003cv5.25sp1",
"product_id": "CSAFPID-3046313"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D PPU.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.95sp5",
"product": {
"name": "vers:unknown/\u003cv4.95sp5",
"product_id": "CSAFPID-3046314"
}
}
],
"category": "product_name",
"name": "SINUMERIK 840D sl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.25sp1",
"product": {
"name": "vers:unknown/\u003cv1.25sp1",
"product_id": "CSAFPID-3046315"
}
}
],
"category": "product_name",
"name": "SINUMERIK MC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.15sp5",
"product": {
"name": "vers:unknown/\u003cv1.15sp5",
"product_id": "CSAFPID-3046316"
}
}
],
"category": "product_name",
"name": "SINUMERIK MC V1.15"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.25sp1",
"product": {
"name": "vers:unknown/\u003cv6.25sp1",
"product_id": "CSAFPID-3046317"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv6.15sp5",
"product": {
"name": "vers:unknown/\u003cv6.15sp5",
"product_id": "CSAFPID-3046318"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE V6.15"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-0395",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0395 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-0395"
},
{
"cve": "CVE-2025-0665",
"cwe": {
"id": "CWE-1341",
"name": "Multiple Releases of Same Resource or Handle"
},
"notes": [
{
"category": "other",
"text": "Multiple Releases of Same Resource or Handle",
"title": "CWE-1341"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0665.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-0665"
},
{
"cve": "CVE-2025-0725",
"cwe": {
"id": "CWE-680",
"name": "Integer Overflow to Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0725 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-0725"
},
{
"cve": "CVE-2025-1390",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-1390"
},
{
"cve": "CVE-2025-3277",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3277 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3277.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-3277"
},
{
"cve": "CVE-2025-3360",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3360 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3360.json"
}
],
"title": "CVE-2025-3360"
},
{
"cve": "CVE-2025-6395",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6395 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-6395"
},
{
"cve": "CVE-2025-21694",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21694.json"
}
],
"title": "CVE-2025-21694"
},
{
"cve": "CVE-2025-29087",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29087 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-29087.json"
}
],
"title": "CVE-2025-29087"
},
{
"cve": "CVE-2025-29088",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29088 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-29088.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-29088"
},
{
"cve": "CVE-2025-30033",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30033 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-30033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-30033"
},
{
"cve": "CVE-2025-30034",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-30034.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-30034"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32988",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32988 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32988.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-32988"
},
{
"cve": "CVE-2025-32989",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-32989"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-33023",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-33023 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-33023.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-33023"
},
{
"cve": "CVE-2025-40570",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40570 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40570.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40570"
},
{
"cve": "CVE-2025-40584",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40584 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40584"
},
{
"cve": "CVE-2025-40743",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40743 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40743.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40743"
},
{
"cve": "CVE-2025-40746",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40746 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40746.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40746"
},
{
"cve": "CVE-2025-40751",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40751 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40751.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40751"
},
{
"cve": "CVE-2025-40752",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40752"
},
{
"cve": "CVE-2025-40753",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40753"
},
{
"cve": "CVE-2025-40759",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40759 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40759"
},
{
"cve": "CVE-2025-40761",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40761 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40761.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40761"
},
{
"cve": "CVE-2025-40762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40762 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40762"
},
{
"cve": "CVE-2025-40764",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40764 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40764.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40764"
},
{
"cve": "CVE-2025-40766",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40766 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40766"
},
{
"cve": "CVE-2025-40767",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"notes": [
{
"category": "other",
"text": "Execution with Unnecessary Privileges",
"title": "CWE-250"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40767"
},
{
"cve": "CVE-2025-40768",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40768 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40768.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40768"
},
{
"cve": "CVE-2025-40769",
"cwe": {
"id": "CWE-1164",
"name": "Irrelevant Code"
},
"notes": [
{
"category": "other",
"text": "Irrelevant Code",
"title": "CWE-1164"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40769 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40769.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40769"
},
{
"cve": "CVE-2025-40770",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40770 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40770.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-40770"
},
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-272",
"name": "Least Privilege Violation"
},
"notes": [
{
"category": "other",
"text": "Least Privilege Violation",
"title": "CWE-272"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47809 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3046293",
"CSAFPID-3046294",
"CSAFPID-3046295",
"CSAFPID-3046296",
"CSAFPID-3046297",
"CSAFPID-3046298",
"CSAFPID-3046299",
"CSAFPID-3046300",
"CSAFPID-3046301",
"CSAFPID-3046302",
"CSAFPID-3046303",
"CSAFPID-3046192",
"CSAFPID-3046193",
"CSAFPID-3046194",
"CSAFPID-1296857",
"CSAFPID-3046195",
"CSAFPID-3046196",
"CSAFPID-3046197",
"CSAFPID-3046198",
"CSAFPID-3046204",
"CSAFPID-3046205",
"CSAFPID-3046206",
"CSAFPID-3046207",
"CSAFPID-3046208",
"CSAFPID-3046212",
"CSAFPID-3046213",
"CSAFPID-3046211",
"CSAFPID-3046214",
"CSAFPID-3046215",
"CSAFPID-3046216",
"CSAFPID-3046209",
"CSAFPID-3046210",
"CSAFPID-1426215",
"CSAFPID-1296547",
"CSAFPID-3046217",
"CSAFPID-3046218",
"CSAFPID-2963002",
"CSAFPID-3046325",
"CSAFPID-3046324",
"CSAFPID-3045960",
"CSAFPID-3045961",
"CSAFPID-3045962",
"CSAFPID-3046175",
"CSAFPID-3046304",
"CSAFPID-3046305",
"CSAFPID-3046306",
"CSAFPID-3046307",
"CSAFPID-3046308",
"CSAFPID-3045854",
"CSAFPID-3045855",
"CSAFPID-3045856",
"CSAFPID-3045857",
"CSAFPID-3045858",
"CSAFPID-3045859",
"CSAFPID-3045860",
"CSAFPID-3045861",
"CSAFPID-3045862",
"CSAFPID-3045863",
"CSAFPID-3045864",
"CSAFPID-3045865",
"CSAFPID-3045866",
"CSAFPID-3045867",
"CSAFPID-3045868",
"CSAFPID-3045869",
"CSAFPID-3045870",
"CSAFPID-3045871",
"CSAFPID-3045872",
"CSAFPID-3045873",
"CSAFPID-3045874",
"CSAFPID-3045875",
"CSAFPID-3045876",
"CSAFPID-3045877",
"CSAFPID-3045878",
"CSAFPID-3045879",
"CSAFPID-3045880",
"CSAFPID-3045881",
"CSAFPID-3045882",
"CSAFPID-3045883",
"CSAFPID-3045884",
"CSAFPID-3045885",
"CSAFPID-3045886",
"CSAFPID-3045887",
"CSAFPID-3045888",
"CSAFPID-3045889",
"CSAFPID-3046312",
"CSAFPID-3046313",
"CSAFPID-3046314",
"CSAFPID-3046315",
"CSAFPID-3046316",
"CSAFPID-3046317",
"CSAFPID-3046318"
]
}
],
"title": "CVE-2025-47809"
}
]
}
CERTFR-2025-AVI-0677
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PCS neo V6.0 versions antérieures à V6.0 SP1 | ||
| Siemens | N/A | SIMATIC WinCC V17, v18 et V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Control Function Library (CFL) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIPROTEC 5 versions antérieures à 10.0 | ||
| Siemens | N/A | SIMATIC MTP Integrator toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V17 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Line Coordination toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC TeleControl toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P020 | ||
| Siemens | N/A | SIMATIC WinCC flexible ES toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions antérieures à 4.0.1 | ||
| Siemens | N/A | SIMATIC PCS neo V6.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P032 | ||
| Siemens | N/A | TIA Portal Cloud V19 versions antérieures à 5.2.1.1 | ||
| Siemens | N/A | SIMATIC D7-SYS toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC BATCH V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ODK 1500S toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2020 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V2 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud Connector toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified Sequence toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40759. | ||
| Siemens | N/A | SIMATIC WinCC Runtime Advanced toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Logon V2.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC Safety Matrix toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Management Console toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC BATCH V9.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Process Function Library (PFL) V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller V3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V20 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC NET PC Software toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Route Control V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.20 versions antérieures à V3.20 P008 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.3 | ||
| Siemens | N/A | Siprotec 4 7SA6, 7SD5 et 7SD610 versions antérieures à 4.78 | ||
| Siemens | N/A | SIMATIC Automation Tool toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | TIA Portal Cloud V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC PDM V9.2 et V9.3 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC eaSie Workflow Skills toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 CFC V19 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC WinCC V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | SIMATIC Management Agent toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V5.7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Automation Tool SDK Windows toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V20 versions antérieures à V20 Update 1 | ||
| Siemens | N/A | TIA Portal Cloud V17 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC Energy Suite toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Process Historian 2024 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC STEP 7 V19 versions antérieures à V19 Update 4 | ||
| Siemens | N/A | TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7-PCT toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Target toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC ProSave V18 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC Logon V1.6 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC STEP 7 V17 et V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V7.0 Update 1 | ||
| Siemens | N/A | SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-54678 | ||
| Siemens | N/A | SIMATIC STEP 7 V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | TIA Portal Cloud V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759 | ||
| Siemens | N/A | Siprotec 4 toutes versions et tous modèles exceptés 7SA6, 7SD5, 7SD610 pour la vulnérabilité CVE-2024-52504. | ||
| Siemens | N/A | SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions antérieures à 3.2 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.4 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC Information Server toutes versions pour la vulnérabilité CVE-2025-47809 | ||
| Siemens | N/A | SIMATIC S7 F Systems V6.3 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033. | ||
| Siemens | N/A | SIMATIC ProSave V20 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | WinCC Panel Image Setup toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC PCS neo V4.1 et V5.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678. | ||
| Siemens | N/A | SIMATIC Route Control V10.0 toutes versions pour la vulnérabilité CVE-2025-30033 | ||
| Siemens | N/A | SIMATIC WinCC V8.1 versions antérieures à V8.1 Update 3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PCS neo V6.0 versions ant\u00e9rieures \u00e0 V6.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17, v18 et V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Control Function Library (CFL) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP Integrator toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Line Coordination toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC TeleControl toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P020",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC flexible ES toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions ant\u00e9rieures \u00e0 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V6.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P032",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V19 versions ant\u00e9rieures \u00e0 5.2.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC D7-SYS toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ODK 1500S toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2020 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V2 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud Connector toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified Sequence toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40759.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Advanced toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V2.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Safety Matrix toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Console toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V9.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Function Library (PFL) V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller V3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V20 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.20 versions ant\u00e9rieures \u00e0 V3.20 P008",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 7SA6, 7SD5 et 7SD610 versions ant\u00e9rieures \u00e0 4.78",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PDM V9.2 et V9.3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie Workflow Skills toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 CFC V19 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Management Agent toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5.7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool SDK Windows toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V20 versions ant\u00e9rieures \u00e0 V20 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V17 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Energy Suite toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Process Historian 2024 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PCT toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Target toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V18 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Logon V1.6 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 et V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V7.0 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siprotec 4 toutes versions et tous mod\u00e8les except\u00e9s 7SA6, 7SD5, 7SD610 pour la vuln\u00e9rabilit\u00e9 CVE-2024-52504. ",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.4 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Information Server toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 F Systems V6.3 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "WinCC Panel Image Setup toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V4.1 et V5.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V8.1 versions ant\u00e9rieures \u00e0 V8.1 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2024-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2023-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-51782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
},
{
"name": "CVE-2023-51781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2023-52601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-52604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
},
{
"name": "CVE-2023-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-52583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
},
{
"name": "CVE-2023-52603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0584"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52504"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2023-52509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52509"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-52510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52510"
},
{
"name": "CVE-2024-26754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2024-26763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2024-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2024-26839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52655"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
},
{
"name": "CVE-2024-40968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
},
{
"name": "CVE-2024-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2022-48666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
},
{
"name": "CVE-2024-36484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-41020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
},
{
"name": "CVE-2024-41022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
},
{
"name": "CVE-2024-41034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2024-41046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
},
{
"name": "CVE-2024-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"name": "CVE-2024-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
},
{
"name": "CVE-2024-41077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
},
{
"name": "CVE-2024-42101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
},
{
"name": "CVE-2024-42143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42143"
},
{
"name": "CVE-2024-42148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-42153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2024-42082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
},
{
"name": "CVE-2023-52887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-42076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
},
{
"name": "CVE-2024-42077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2024-42086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
},
{
"name": "CVE-2024-42087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
},
{
"name": "CVE-2024-42092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
},
{
"name": "CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"name": "CVE-2024-42095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
},
{
"name": "CVE-2022-48935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48935"
},
{
"name": "CVE-2024-43861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
},
{
"name": "CVE-2024-43867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-43879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-43882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
},
{
"name": "CVE-2024-43883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-43893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
},
{
"name": "CVE-2024-43894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
},
{
"name": "CVE-2024-43907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
},
{
"name": "CVE-2024-43908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
},
{
"name": "CVE-2024-45003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2024-44988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-44995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
},
{
"name": "CVE-2024-44998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
},
{
"name": "CVE-2024-44999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
},
{
"name": "CVE-2024-45006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
},
{
"name": "CVE-2024-45008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-45025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
},
{
"name": "CVE-2024-46673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
},
{
"name": "CVE-2024-46674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
},
{
"name": "CVE-2024-46675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
},
{
"name": "CVE-2024-46676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
},
{
"name": "CVE-2024-46677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
},
{
"name": "CVE-2024-46679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
},
{
"name": "CVE-2024-46685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
},
{
"name": "CVE-2024-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
},
{
"name": "CVE-2024-46702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
},
{
"name": "CVE-2024-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
},
{
"name": "CVE-2024-46719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
},
{
"name": "CVE-2024-46721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
},
{
"name": "CVE-2024-46722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
},
{
"name": "CVE-2024-46723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
},
{
"name": "CVE-2024-46724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
},
{
"name": "CVE-2024-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
},
{
"name": "CVE-2024-46731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
},
{
"name": "CVE-2024-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
},
{
"name": "CVE-2024-46738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
},
{
"name": "CVE-2024-46739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
},
{
"name": "CVE-2024-46740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
},
{
"name": "CVE-2024-46743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
},
{
"name": "CVE-2024-46744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
},
{
"name": "CVE-2024-46745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
},
{
"name": "CVE-2024-46747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
},
{
"name": "CVE-2024-46750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
},
{
"name": "CVE-2024-46755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
},
{
"name": "CVE-2024-46756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
},
{
"name": "CVE-2024-46757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
},
{
"name": "CVE-2024-46758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-46761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46771",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2024-46780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
},
{
"name": "CVE-2024-46781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
},
{
"name": "CVE-2024-46791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
},
{
"name": "CVE-2024-46798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
},
{
"name": "CVE-2024-46800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
},
{
"name": "CVE-2024-46804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
},
{
"name": "CVE-2024-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
},
{
"name": "CVE-2024-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
},
{
"name": "CVE-2024-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
},
{
"name": "CVE-2024-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
},
{
"name": "CVE-2024-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
},
{
"name": "CVE-2024-46829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
},
{
"name": "CVE-2024-46832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
},
{
"name": "CVE-2024-46840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
},
{
"name": "CVE-2024-46844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
},
{
"name": "CVE-2024-43890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
},
{
"name": "CVE-2024-43914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-44944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
},
{
"name": "CVE-2024-44952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
},
{
"name": "CVE-2024-44954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
},
{
"name": "CVE-2024-44960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
},
{
"name": "CVE-2024-44965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
},
{
"name": "CVE-2024-44969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
},
{
"name": "CVE-2024-44971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2024-47663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
},
{
"name": "CVE-2024-47667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
},
{
"name": "CVE-2024-47669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2023-52919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52919"
},
{
"name": "CVE-2024-47660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
},
{
"name": "CVE-2024-47684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
},
{
"name": "CVE-2024-47685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
},
{
"name": "CVE-2024-47692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
},
{
"name": "CVE-2024-47698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
},
{
"name": "CVE-2024-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
},
{
"name": "CVE-2024-47705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
},
{
"name": "CVE-2024-47706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
},
{
"name": "CVE-2024-47709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
},
{
"name": "CVE-2024-47710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
},
{
"name": "CVE-2024-47712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
},
{
"name": "CVE-2024-47713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
},
{
"name": "CVE-2024-47718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
},
{
"name": "CVE-2024-47723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
},
{
"name": "CVE-2024-47735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
},
{
"name": "CVE-2024-47737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
},
{
"name": "CVE-2024-47739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
},
{
"name": "CVE-2024-47742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
},
{
"name": "CVE-2024-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
},
{
"name": "CVE-2024-47748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
},
{
"name": "CVE-2024-47749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
},
{
"name": "CVE-2024-47756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
},
{
"name": "CVE-2024-47757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
},
{
"name": "CVE-2024-49851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
},
{
"name": "CVE-2024-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
},
{
"name": "CVE-2024-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
},
{
"name": "CVE-2024-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
},
{
"name": "CVE-2024-49867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2024-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
},
{
"name": "CVE-2024-49878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
},
{
"name": "CVE-2024-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
},
{
"name": "CVE-2024-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
},
{
"name": "CVE-2024-49882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
},
{
"name": "CVE-2024-49883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
},
{
"name": "CVE-2024-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
},
{
"name": "CVE-2024-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
},
{
"name": "CVE-2024-49894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
},
{
"name": "CVE-2024-49895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
},
{
"name": "CVE-2024-49896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
},
{
"name": "CVE-2024-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2024-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
},
{
"name": "CVE-2024-49903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
},
{
"name": "CVE-2024-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
},
{
"name": "CVE-2024-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
},
{
"name": "CVE-2024-49930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
},
{
"name": "CVE-2024-49933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
},
{
"name": "CVE-2024-49936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
},
{
"name": "CVE-2024-49938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2024-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
},
{
"name": "CVE-2024-49957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
},
{
"name": "CVE-2024-49958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2024-49962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
},
{
"name": "CVE-2024-49963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
},
{
"name": "CVE-2024-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
},
{
"name": "CVE-2024-49966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
},
{
"name": "CVE-2024-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
},
{
"name": "CVE-2024-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
},
{
"name": "CVE-2024-49973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
},
{
"name": "CVE-2024-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
},
{
"name": "CVE-2024-49981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
},
{
"name": "CVE-2024-49982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
},
{
"name": "CVE-2024-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
},
{
"name": "CVE-2024-49993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49993"
},
{
"name": "CVE-2024-49995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
},
{
"name": "CVE-2024-50001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
},
{
"name": "CVE-2024-50006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
},
{
"name": "CVE-2024-50007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
},
{
"name": "CVE-2024-50008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
},
{
"name": "CVE-2024-50013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
},
{
"name": "CVE-2024-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
},
{
"name": "CVE-2024-50024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
},
{
"name": "CVE-2024-50033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
},
{
"name": "CVE-2024-50035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2024-50044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
},
{
"name": "CVE-2024-50045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
},
{
"name": "CVE-2024-50046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
},
{
"name": "CVE-2024-50049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
},
{
"name": "CVE-2024-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-44949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
},
{
"name": "CVE-2024-50218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
},
{
"name": "CVE-2024-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
},
{
"name": "CVE-2024-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
},
{
"name": "CVE-2024-50237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
},
{
"name": "CVE-2024-50251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
},
{
"name": "CVE-2024-50262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2024-50265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-50269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
},
{
"name": "CVE-2024-50273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
},
{
"name": "CVE-2024-50278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-50287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
},
{
"name": "CVE-2024-50295",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
},
{
"name": "CVE-2024-50296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2024-50301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
},
{
"name": "CVE-2024-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
},
{
"name": "CVE-2024-53061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
},
{
"name": "CVE-2024-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
},
{
"name": "CVE-2024-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2024-47679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
},
{
"name": "CVE-2024-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
},
{
"name": "CVE-2024-47740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
},
{
"name": "CVE-2024-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
},
{
"name": "CVE-2024-49884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
},
{
"name": "CVE-2024-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-49944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
},
{
"name": "CVE-2024-49948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
},
{
"name": "CVE-2024-49952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-49983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
},
{
"name": "CVE-2024-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
},
{
"name": "CVE-2024-50039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
},
{
"name": "CVE-2024-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
},
{
"name": "CVE-2024-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
},
{
"name": "CVE-2024-50179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
},
{
"name": "CVE-2024-50180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
},
{
"name": "CVE-2024-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
},
{
"name": "CVE-2024-50184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
},
{
"name": "CVE-2024-50188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
},
{
"name": "CVE-2024-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50089"
},
{
"name": "CVE-2024-50194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2024-50198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
},
{
"name": "CVE-2024-50201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
},
{
"name": "CVE-2024-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
},
{
"name": "CVE-2024-50193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
},
{
"name": "CVE-2024-50199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
},
{
"name": "CVE-2024-50202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
},
{
"name": "CVE-2024-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
},
{
"name": "CVE-2024-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
},
{
"name": "CVE-2024-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
},
{
"name": "CVE-2024-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
},
{
"name": "CVE-2024-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
},
{
"name": "CVE-2024-53157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
},
{
"name": "CVE-2024-53158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
},
{
"name": "CVE-2024-53161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
},
{
"name": "CVE-2024-53171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
},
{
"name": "CVE-2024-53173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
},
{
"name": "CVE-2024-53174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
},
{
"name": "CVE-2024-53214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2024-53237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
},
{
"name": "CVE-2024-56539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
},
{
"name": "CVE-2024-56562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56562"
},
{
"name": "CVE-2024-56567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56567"
},
{
"name": "CVE-2024-56576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56576"
},
{
"name": "CVE-2024-56605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56605"
},
{
"name": "CVE-2024-56645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56645"
},
{
"name": "CVE-2024-56754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2024-53239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2024-56570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56570"
},
{
"name": "CVE-2024-56571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56571"
},
{
"name": "CVE-2024-56598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56598"
},
{
"name": "CVE-2024-56619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56619"
},
{
"name": "CVE-2024-56704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
},
{
"name": "CVE-2024-47143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47143"
},
{
"name": "CVE-2024-48881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48881"
},
{
"name": "CVE-2024-50051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
},
{
"name": "CVE-2024-52332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52332"
},
{
"name": "CVE-2024-53172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
},
{
"name": "CVE-2024-53194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2024-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
},
{
"name": "CVE-2024-53227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
},
{
"name": "CVE-2024-56531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
},
{
"name": "CVE-2024-56532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
},
{
"name": "CVE-2024-56533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
},
{
"name": "CVE-2024-56558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
},
{
"name": "CVE-2024-56568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56568"
},
{
"name": "CVE-2024-56569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56569"
},
{
"name": "CVE-2024-56572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56572"
},
{
"name": "CVE-2024-56574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56574"
},
{
"name": "CVE-2024-56587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56587"
},
{
"name": "CVE-2024-56589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56589"
},
{
"name": "CVE-2024-56593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
},
{
"name": "CVE-2024-56594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56594"
},
{
"name": "CVE-2024-56595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56595"
},
{
"name": "CVE-2024-56596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56596"
},
{
"name": "CVE-2024-56597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56597"
},
{
"name": "CVE-2024-56602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56602"
},
{
"name": "CVE-2024-56603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56603"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2024-56615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56615"
},
{
"name": "CVE-2024-56623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56623"
},
{
"name": "CVE-2024-56629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56629"
},
{
"name": "CVE-2024-56630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56630"
},
{
"name": "CVE-2024-56634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56634"
},
{
"name": "CVE-2024-56636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56636"
},
{
"name": "CVE-2024-56637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56637"
},
{
"name": "CVE-2024-56642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
},
{
"name": "CVE-2024-56643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56643"
},
{
"name": "CVE-2024-56644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
},
{
"name": "CVE-2024-56648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56648"
},
{
"name": "CVE-2024-56659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56659"
},
{
"name": "CVE-2024-56661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
},
{
"name": "CVE-2024-56662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56662"
},
{
"name": "CVE-2024-56670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56670"
},
{
"name": "CVE-2024-56681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
},
{
"name": "CVE-2024-56688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2024-56691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
},
{
"name": "CVE-2024-56698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
},
{
"name": "CVE-2024-56700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
},
{
"name": "CVE-2024-56701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-56723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
},
{
"name": "CVE-2024-56724",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
},
{
"name": "CVE-2024-56739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
},
{
"name": "CVE-2024-56741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
},
{
"name": "CVE-2024-56746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
},
{
"name": "CVE-2024-56747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
},
{
"name": "CVE-2024-56748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
},
{
"name": "CVE-2024-56779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
},
{
"name": "CVE-2024-56780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56780"
},
{
"name": "CVE-2024-57874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57874"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
},
{
"name": "CVE-2024-56600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
},
{
"name": "CVE-2024-56601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56601"
},
{
"name": "CVE-2024-56610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56610"
},
{
"name": "CVE-2024-56650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
},
{
"name": "CVE-2024-56728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
},
{
"name": "CVE-2024-56633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
},
{
"name": "CVE-2022-49034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
},
{
"name": "CVE-2024-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
},
{
"name": "CVE-2024-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
},
{
"name": "CVE-2024-53165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
},
{
"name": "CVE-2024-53181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
},
{
"name": "CVE-2024-53183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
},
{
"name": "CVE-2024-53184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
},
{
"name": "CVE-2024-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
},
{
"name": "CVE-2024-56720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
},
{
"name": "CVE-2024-43098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43098"
},
{
"name": "CVE-2024-53680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
},
{
"name": "CVE-2024-56581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
},
{
"name": "CVE-2024-56586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56586"
},
{
"name": "CVE-2024-56770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
},
{
"name": "CVE-2024-56781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56781"
},
{
"name": "CVE-2024-56785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56785"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2024-54678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54678"
},
{
"name": "CVE-2025-30033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30033"
},
{
"name": "CVE-2025-30034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30034"
},
{
"name": "CVE-2025-40570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40570"
},
{
"name": "CVE-2025-40746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40746"
},
{
"name": "CVE-2025-40751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40751"
},
{
"name": "CVE-2025-40752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40752"
},
{
"name": "CVE-2025-40753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40753"
},
{
"name": "CVE-2025-40759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40759"
},
{
"name": "CVE-2025-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
},
{
"name": "CVE-2024-52504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52504"
}
],
"initial_release_date": "2025-08-12T00:00:00",
"last_revision_date": "2025-08-12T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0677",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-707630",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-707630.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-331739",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693808",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693808.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-613116",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493396",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493396.html"
},
{
"published_at": "2025-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-400089",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-400089.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493787",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-493787.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-894058",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-894058.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-355557",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-529291",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-282044",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-282044.html"
}
]
}
CERTFR-2025-AVI-0704
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Siemens. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": " SENTRON Powermanager toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Desigo CC toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
}
],
"initial_release_date": "2025-08-18T00:00:00",
"last_revision_date": "2025-08-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0704",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Siemens. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-201595",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-201595.html"
}
]
}
icsa-25-226-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "WIBU Systems published information about a privilege escalation vulnerability under a certain circumstances and associated fix releases of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens industrial products.\n\nSiemens has released new versions for affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-331739 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Financial Services, Healthcare and Public Health, Transportation Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-331739.json"
},
{
"category": "self",
"summary": "SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-226-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-226-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-226-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens WIBU CodeMeter Runtime",
"tracking": {
"current_release_date": "2025-09-09T00:00:00.000000Z",
"generator": {
"date": "2025-09-11T15:37:58.531809Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-226-05",
"initial_release_date": "2025-08-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-09-09T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed Simatic Information Server and Simatic Process Historian as they are not affected."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC PDM Maintenance Station V5.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC PDM Maintenance Station V5.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.18_P032",
"product": {
"name": "SIMATIC WinCC OA V3.18",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.19_P020",
"product": {
"name": "SIMATIC WinCC OA V3.19",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.20_P008",
"product": {
"name": "SIMATIC WinCC OA V3.20",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC OA V3.20"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-272",
"name": "Least Privilege Violation"
},
"notes": [
{
"category": "summary",
"text": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.18 P032 or later version",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109994004/"
},
{
"category": "vendor_fix",
"details": "Update to V3.19 P020 or later version",
"product_ids": [
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989640/"
},
{
"category": "vendor_fix",
"details": "Update to V3.20 P008 or later version",
"product_ids": [
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109990967/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2025-47809"
}
]
}
icsa-25-231-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Versions V5.0 through V8 of the Desigo CC product family (Desigo CC, Desigo CC Compact, Desigo CC Connect, Cerberus DMS), as well as the Desigo CC-based SENTRON Powermanager, are affected by a vulnerability in the underlying third-party component WIBU Systems CodeMeter Runtime. Successful exploitation of this vulnerability could allow privilege escalation.\n\nSiemens has released instructions how to update the CodeMeter Runtime component and recommends to apply the update on affected systems.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-201595 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-201595.json"
},
{
"category": "self",
"summary": "SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-201595.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-231-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-231-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-231-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-231-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Desigo CC Product Family and SENTRON Powermanager",
"tracking": {
"current_release_date": "2025-08-14T00:00:00.000000Z",
"generator": {
"date": "2025-08-19T15:21:50.901018Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-231-01",
"initial_release_date": "2025-08-14T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-08-14T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V5.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Desigo CC family V5.0"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V5.1",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Desigo CC family V5.1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V6",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Desigo CC family V6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V7",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Desigo CC family V7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Desigo CC family V8",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Desigo CC family V8"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V5",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V6",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V7",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SENTRON Powermanager V8",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SENTRON Powermanager V8"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"cwe": {
"id": "CWE-272",
"name": "Least Privilege Violation"
},
"notes": [
{
"category": "summary",
"text": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Apply patch as documented in section \u0027Additional Information\u0027",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2025-47809"
}
]
}
wid-sec-w-2025-1076
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "CodeMeter ist eine Software zur Durchsetzung von Lizenzrechten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Wibu-Systems CodeMeter ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1076 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1076.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1076 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1076"
},
{
"category": "external",
"summary": "WIBU Security Advisory vom 2025-05-15",
"url": "https://www.wibu.com/de/support/security-advisories/wibu-100120.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-331739 vom 2025-08-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
}
],
"source_lang": "en-US",
"title": "Wibu-Systems CodeMeter: Schwachstelle erm\u00f6glicht Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-12T22:00:00.000+00:00",
"generator": {
"date": "2025-08-13T06:27:43.009+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1076",
"initial_release_date": "2025-05-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Siemens aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "OA",
"product": {
"name": "Siemens SIMATIC WinCC OA",
"product_id": "T017225",
"product_identification_helper": {
"cpe": "cpe:/a:siemens:simatic_wincc:oa"
}
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Runtime \u003c8.30a",
"product": {
"name": "Wibu-Systems CodeMeter Runtime \u003c8.30a",
"product_id": "T043859"
}
},
{
"category": "product_version",
"name": "Runtime 8.30a",
"product": {
"name": "Wibu-Systems CodeMeter Runtime 8.30a",
"product_id": "T043859-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:wibu:codemeter:runtime__8.30a"
}
}
}
],
"category": "product_name",
"name": "CodeMeter"
}
],
"category": "vendor",
"name": "Wibu-Systems"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47809",
"product_status": {
"known_affected": [
"T017225",
"T043859"
]
},
"release_date": "2025-05-15T22:00:00.000+00:00",
"title": "CVE-2025-47809"
}
]
}
ghsa-2rfr-r5fg-2857
Vulnerability from github
Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.
{
"affected": [],
"aliases": [
"CVE-2025-47809"
],
"database_specific": {
"cwe_ids": [
"CWE-272"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-05-16T01:15:51Z",
"severity": "HIGH"
},
"details": "Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.",
"id": "GHSA-2rfr-r5fg-2857",
"modified": "2025-05-16T03:30:33Z",
"published": "2025-05-16T03:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47809"
},
{
"type": "WEB",
"url": "https://www.wibu.com/support/security-advisories/wibu-100120.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.