Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-20708 (GCVE-0-2025-20708)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
| URL | Tags | ||
|---|---|---|---|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-20708",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-02T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T03:55:30.011Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893",
"vendor": "MediaTek, Inc.",
"versions": [
{
"status": "affected",
"version": "Modem NR15, NR16, NR17, NR17R"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-01T05:12:16.345Z",
"orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"shortName": "MediaTek"
},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/September-2025"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
"assignerShortName": "MediaTek",
"cveId": "CVE-2025-20708",
"datePublished": "2025-09-01T05:12:16.345Z",
"dateReserved": "2024-11-01T01:21:50.383Z",
"dateUpdated": "2025-09-03T03:55:30.011Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20708\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2025-09-01T06:15:35.287\",\"lastModified\":\"2025-09-03T16:06:40.560\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@mediatek.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30A2D2E-6A72-4070-A471-EEE75F7D07F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B763B71-F913-45B4-B91E-D7F0670C4315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F8874B-DBF1-4A67-8ADF-4654AB56B6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC63582A-F9A5-4450-A263-CE1FD4B4F3AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2A1118-B5F7-4EF5-B329-0887B5F3430E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7122918-8C44-4F24-82E4-B8448247FC83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB690F5A-9367-45D3-A53E-80BF60053630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A63103-C708-48EC-B44D-5E465A6B79C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7FE7DBA-479C-402B-8485-9D14E70F25EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"328DA6BE-1303-4646-89B7-2EC8DC444532\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"083F6134-FF26-4F1B-9B77-971D342AF774\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F883C6D3-1724-4553-9EFC-3D204FF3CAA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA54AA1-4E3A-44F8-A222-31C60F8F81DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4D6885-E18C-477F-8B6D-B9E84D9535E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855A8046-34ED-4891-ACE5-76AB10AC8D53\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"483B6FB0-D683-4F3C-BA5B-6C9852179854\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CF4A7A-3136-4C4C-A795-81323896BE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3E2B84-DAFE-4E11-B23B-026F719475F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2141B30A-C56F-4831-8FCD-4758DF97AD18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DEF766-EAF1-4E36-BB7C-43069B26507A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7D8055-F4B6-41EE-A078-11D56285AB66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9131F6-F167-4FD7-8FBF-B372CBBCF46F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2758122C-4D11-4D34-9B72-3905F3A28448\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D6430E-840D-447F-892E-EA4FD7F69BAF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7DE6B2-66D9-4A3E-B15F-D56505559255\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6309AE48-7266-435C-B906-50960F643FC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A76806D-A4E3-466A-90CB-E9FFE478E7A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBBB30DF-E963-4940-B742-F6801F68C3FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152F6606-FA23-4530-AA07-419866B74CB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E6123A-7603-4EAB-AFFB-229E8A040709\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE302F6F-170E-4350-A8F4-65BE0C50CB78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152A5F3D-8004-4649-BDB1-E6F0798AF1CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D09F23D-D023-4A60-B426-61251FDD8A5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD2C3EC-B62D-4616-964F-FDBE5B14A449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB05B1D-77C9-4E42-91AD-9F087413DC20\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336FC69E-E89F-4642-B6B9-8009D9A2BD52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D4E9E1-B044-41EC-BE98-22DC0E5E9010\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B469BF4-5961-42E9-814B-1BE06D182E45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637CAAD2-DCC0-4F81-B781-5D0536844CA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E0D738-F0B9-468F-8A10-204F498320BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6DD525F-7050-42BD-829D-1121698B8009\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23DD8281-FEB4-4E23-8DDA-680FF895F12E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCFAADB1-C2B2-47A6-BB66-761B964E7DFB\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/September-2025\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20708\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-02T13:10:20.677350Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-02T13:10:33.193Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"MediaTek, Inc.\", \"product\": \"MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893\", \"versions\": [{\"status\": \"affected\", \"version\": \"Modem NR15, NR16, NR17, NR17R\"}]}], \"references\": [{\"url\": \"https://corp.mediatek.com/product-security-bulletin/September-2025\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"shortName\": \"MediaTek\", \"dateUpdated\": \"2025-09-01T05:12:16.345Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20708\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-03T03:55:30.011Z\", \"dateReserved\": \"2024-11-01T01:21:50.383Z\", \"assignerOrgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"datePublished\": \"2025-09-01T05:12:16.345Z\", \"assignerShortName\": \"MediaTek\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ghsa-7744-g43m-rwfw
Vulnerability from github
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.
{
"affected": [],
"aliases": [
"CVE-2025-20708"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-01T06:15:35Z",
"severity": "HIGH"
},
"details": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.",
"id": "GHSA-7744-g43m-rwfw",
"modified": "2025-09-02T15:31:07Z",
"published": "2025-09-02T15:31:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20708"
},
{
"type": "WEB",
"url": "https://corp.mediatek.com/product-security-bulletin/September-2025"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-0750
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que les vulnérabilités CVE-2025-38352 et CVE-2025-48543 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14, 15 et 16 avant le correctif du 2 septembre 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-48534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48534"
},
{
"name": "CVE-2025-47326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47326"
},
{
"name": "CVE-2025-48531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48531"
},
{
"name": "CVE-2025-32323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32323"
},
{
"name": "CVE-2025-21487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21487"
},
{
"name": "CVE-2025-48544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48544"
},
{
"name": "CVE-2025-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27065"
},
{
"name": "CVE-2025-48541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48541"
},
{
"name": "CVE-2025-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3212"
},
{
"name": "CVE-2025-47328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47328"
},
{
"name": "CVE-2025-21433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21433"
},
{
"name": "CVE-2025-27034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27034"
},
{
"name": "CVE-2025-8109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8109"
},
{
"name": "CVE-2025-21481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21481"
},
{
"name": "CVE-2025-48535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48535"
},
{
"name": "CVE-2025-48527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48527"
},
{
"name": "CVE-2025-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27032"
},
{
"name": "CVE-2025-48539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48539"
},
{
"name": "CVE-2025-48540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48540"
},
{
"name": "CVE-2025-47317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47317"
},
{
"name": "CVE-2025-32333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32333"
},
{
"name": "CVE-2025-21465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21465"
},
{
"name": "CVE-2025-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25180"
},
{
"name": "CVE-2025-48563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48563"
},
{
"name": "CVE-2025-48526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48526"
},
{
"name": "CVE-2025-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27052"
},
{
"name": "CVE-2025-48538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48538"
},
{
"name": "CVE-2025-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20703"
},
{
"name": "CVE-2025-21482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21482"
},
{
"name": "CVE-2025-21755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
},
{
"name": "CVE-2024-7881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7881"
},
{
"name": "CVE-2025-48556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48556"
},
{
"name": "CVE-2025-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27043"
},
{
"name": "CVE-2025-21464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21464"
},
{
"name": "CVE-2025-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20696"
},
{
"name": "CVE-2025-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21449"
},
{
"name": "CVE-2025-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0076"
},
{
"name": "CVE-2025-1246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1246"
},
{
"name": "CVE-2025-26454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26454"
},
{
"name": "CVE-2025-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21427"
},
{
"name": "CVE-2025-32347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32347"
},
{
"name": "CVE-2025-47329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47329"
},
{
"name": "CVE-2025-21483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21483"
},
{
"name": "CVE-2025-21446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21446"
},
{
"name": "CVE-2025-32325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32325"
},
{
"name": "CVE-2025-25179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25179"
},
{
"name": "CVE-2021-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39810"
},
{
"name": "CVE-2025-48528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48528"
},
{
"name": "CVE-2025-32349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32349"
},
{
"name": "CVE-2025-32345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32345"
},
{
"name": "CVE-2025-48524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48524"
},
{
"name": "CVE-2025-21432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21432"
},
{
"name": "CVE-2025-48542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48542"
},
{
"name": "CVE-2025-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48522"
},
{
"name": "CVE-2025-32331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32331"
},
{
"name": "CVE-2025-48546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48546"
},
{
"name": "CVE-2025-48581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48581"
},
{
"name": "CVE-2025-48551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48551"
},
{
"name": "CVE-2025-27061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27061"
},
{
"name": "CVE-2024-49714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49714"
},
{
"name": "CVE-2025-48547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48547"
},
{
"name": "CVE-2025-48537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48537"
},
{
"name": "CVE-2025-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0467"
},
{
"name": "CVE-2025-46708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46708"
},
{
"name": "CVE-2025-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47318"
},
{
"name": "CVE-2025-21450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21450"
},
{
"name": "CVE-2025-48550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48550"
},
{
"name": "CVE-2025-021701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-021701"
},
{
"name": "CVE-2025-48561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48561"
},
{
"name": "CVE-2025-48553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48553"
},
{
"name": "CVE-2025-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27042"
},
{
"name": "CVE-2025-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48554"
},
{
"name": "CVE-2025-48549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48549"
},
{
"name": "CVE-2025-21477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21477"
},
{
"name": "CVE-2025-48529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48529"
},
{
"name": "CVE-2025-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46710"
},
{
"name": "CVE-2025-32327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32327"
},
{
"name": "CVE-2024-47899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47899"
},
{
"name": "CVE-2025-32332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32332"
},
{
"name": "CVE-2025-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48560"
},
{
"name": "CVE-2025-48559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48559"
},
{
"name": "CVE-2025-1706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1706"
},
{
"name": "CVE-2025-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0089"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2025-32330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32330"
},
{
"name": "CVE-2025-32326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32326"
},
{
"name": "CVE-2025-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27056"
},
{
"name": "CVE-2025-21488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21488"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32324"
},
{
"name": "CVE-2025-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27057"
},
{
"name": "CVE-2025-48532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48532"
},
{
"name": "CVE-2025-27066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27066"
},
{
"name": "CVE-2025-48552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48552"
},
{
"name": "CVE-2024-47898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47898"
},
{
"name": "CVE-2025-48545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48545"
},
{
"name": "CVE-2025-27073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27073"
},
{
"name": "CVE-2025-32350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32350"
},
{
"name": "CVE-2025-21484",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21484"
},
{
"name": "CVE-2025-48523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48523"
},
{
"name": "CVE-2025-48543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48543"
},
{
"name": "CVE-2025-48562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48562"
},
{
"name": "CVE-2025-32321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32321"
},
{
"name": "CVE-2025-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26464"
},
{
"name": "CVE-2025-32346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32346"
},
{
"name": "CVE-2025-20704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20704"
},
{
"name": "CVE-2025-48548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48548"
},
{
"name": "CVE-2025-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21454"
},
{
"name": "CVE-2025-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46707"
},
{
"name": "CVE-2025-20708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20708"
},
{
"name": "CVE-2025-48558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48558"
}
],
"initial_release_date": "2025-09-03T00:00:00",
"last_revision_date": "2025-09-03T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0750",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que les vuln\u00e9rabilit\u00e9s CVE-2025-38352 et CVE-2025-48543 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01?hl=fr"
}
]
}
fkie_cve-2025-20708
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@mediatek.com | https://corp.mediatek.com/product-security-bulletin/September-2025 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB690F5A-9367-45D3-A53E-80BF60053630",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7FE7DBA-479C-402B-8485-9D14E70F25EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "083F6134-FF26-4F1B-9B77-971D342AF774",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA54AA1-4E3A-44F8-A222-31C60F8F81DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4D6885-E18C-477F-8B6D-B9E84D9535E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
"matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "483B6FB0-D683-4F3C-BA5B-6C9852179854",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2141B30A-C56F-4831-8FCD-4758DF97AD18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6430E-840D-447F-892E-EA4FD7F69BAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6309AE48-7266-435C-B906-50960F643FC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77E0D738-F0B9-468F-8A10-204F498320BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DD525F-7050-42BD-829D-1121698B8009",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23DD8281-FEB4-4E23-8DDA-680FF895F12E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131."
}
],
"id": "CVE-2025-20708",
"lastModified": "2025-09-03T16:06:40.560",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-09-01T06:15:35.287",
"references": [
{
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
],
"url": "https://corp.mediatek.com/product-security-bulletin/September-2025"
}
],
"sourceIdentifier": "security@mediatek.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "security@mediatek.com",
"type": "Secondary"
}
]
}
wid-sec-w-2025-1944
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1944 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1944.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1944 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1944"
},
{
"category": "external",
"summary": "Sicherheitsbulletin f\u00fcr Android \u2013 September 2025 vom 2025-09-02",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"source_lang": "en-US",
"title": "Android Patchday September 2025: Multiple Vulnerabilities",
"tracking": {
"current_release_date": "2025-09-08T22:00:00.000+00:00",
"generator": {
"date": "2025-09-09T07:41:17.056+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1944",
"initial_release_date": "2025-09-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-26818, EUVD-2025-26819, EUVD-2025-26822, EUVD-2025-26823, EUVD-2025-26824, EUVD-2025-26825, EUVD-2025-26826, EUVD-2025-26828, EUVD-2025-26829, EUVD-2025-26830, EUVD-2025-26831, EUVD-2025-26834, EUVD-2025-26835, EUVD-2025-26836, EUVD-2025-26837, EUVD-2025-26796, EUVD-2025-26804, EUVD-2025-26805, EUVD-2025-26806, EUVD-2025-26807, EUVD-2025-26808, EUVD-2025-26811, EUVD-2025-26814, EUVD-2025-26815, EUVD-2025-26816, EUVD-2025-26827, EUVD-2025-26832, EUVD-2025-26795, EUVD-2025-26833, EUVD-2025-26803, EUVD-2025-26809, EUVD-2025-26799, EUVD-2025-26800, EUVD-2025-26810, EUVD-2025-26812, EUVD-2025-26813, EUVD-2025-26817, EUVD-2025-26791, EUVD-2025-26797, EUVD-2025-26798, EUVD-2025-26801, EUVD-2025-26802, EUVD-2024-54966, EUVD-2025-26792, EUVD-2025-26793, EUVD-2025-26794, EUVD-2025-26838, EUVD-2025-26839, EUVD-2025-26840, EUVD-2025-26841, EUVD-2025-26842, EUVD-2025-26843, EUVD-2025-26844, EUVD-2025-26845, EUVD-2025-26846, EUVD-2025-26820, EUVD-2025-26821"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2025-27124"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "13 \u003c2025-09-05",
"product": {
"name": "Google Android 13 \u003c2025-09-05",
"product_id": "T046664"
}
},
{
"category": "product_version",
"name": "13 2025-09-05",
"product": {
"name": "Google Android 13 2025-09-05",
"product_id": "T046664-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:13__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "14 \u003c2025-09-05",
"product": {
"name": "Google Android 14 \u003c2025-09-05",
"product_id": "T046665"
}
},
{
"category": "product_version",
"name": "14 2025-09-05",
"product": {
"name": "Google Android 14 2025-09-05",
"product_id": "T046665-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:14__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003c2025-09-05",
"product": {
"name": "Google Android 15 \u003c2025-09-05",
"product_id": "T046666"
}
},
{
"category": "product_version",
"name": "15 2025-09-05",
"product": {
"name": "Google Android 15 2025-09-05",
"product_id": "T046666-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:15__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "16 \u003c2025-09-05",
"product": {
"name": "Google Android 16 \u003c2025-09-05",
"product_id": "T046667"
}
},
{
"category": "product_version",
"name": "16 2025-09-05",
"product": {
"name": "Google Android 16 2025-09-05",
"product_id": "T046667-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:16__2025-09-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48581"
},
{
"cve": "CVE-2025-8109",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-47898",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2024-7881",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-021701",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-021701"
},
{
"cve": "CVE-2025-0467",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-20696",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21427",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48523"
}
]
}
ncsc-2025-0273
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.\n\nNaast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.\n\nGoogle meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.\n\nZie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Value Delimiters",
"title": "CWE-142"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
},
{
"category": "external",
"summary": "Reference",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-09-04T08:15:14.806733Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0273",
"initial_release_date": "2025-09-04T08:15:14.806733Z",
"revision_history": [
{
"date": "2025-09-04T08:15:14.806733Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13 \u003c2025-09-05",
"product": {
"name": "vers:unknown/13 \u003c2025-09-05",
"product_id": "CSAFPID-3094337"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14 \u003c2025-09-05",
"product": {
"name": "vers:unknown/14 \u003c2025-09-05",
"product_id": "CSAFPID-3094338"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15 \u003c2025-09-05",
"product": {
"name": "vers:unknown/15 \u003c2025-09-05",
"product_id": "CSAFPID-3094335"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16 \u003c2025-09-05",
"product": {
"name": "vers:unknown/16 \u003c2025-09-05",
"product_id": "CSAFPID-3094336"
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product_id": "CSAFPID-3094178"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product_id": "CSAFPID-3094177"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product_id": "CSAFPID-3094180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product_id": "CSAFPID-3094179"
}
}
],
"category": "product_name",
"name": "Samsung Mobile Devices"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39810 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-39810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24023 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-24023.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-7881",
"cwe": {
"id": "CWE-1422",
"name": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2024-47898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47898 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47898.json"
}
],
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47899 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47899.json"
}
],
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49714.json"
}
],
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0076 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0076.json"
}
],
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0089 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0089.json"
}
],
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-0467",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0467 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1706.json"
}
],
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3212 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3212.json"
}
],
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-8109",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8109 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8109.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2025-20696",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20696.json"
}
],
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20703.json"
}
],
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20704.json"
}
],
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20708.json"
}
],
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21025",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21025 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21025"
},
{
"cve": "CVE-2025-21026",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21026 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21026.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21026"
},
{
"cve": "CVE-2025-21027",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21027 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21027"
},
{
"cve": "CVE-2025-21028",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21028 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21028"
},
{
"cve": "CVE-2025-21029",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21029 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21029.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21029"
},
{
"cve": "CVE-2025-21030",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21030 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21030"
},
{
"cve": "CVE-2025-21031",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21031 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21031"
},
{
"cve": "CVE-2025-21032",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21032"
},
{
"cve": "CVE-2025-21033",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21033 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21033"
},
{
"cve": "CVE-2025-21034",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21034.json"
}
],
"title": "CVE-2025-21034"
},
{
"cve": "CVE-2025-21427",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21432.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21433.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21449.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21477 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21481.json"
}
],
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21482 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21482.json"
}
],
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21483 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21483.json"
}
],
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21484 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21484.json"
}
],
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21487.json"
}
],
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21488 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21488.json"
}
],
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21755.json"
}
],
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25179 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25179.json"
}
],
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25180 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25180.json"
}
],
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26454.json"
}
],
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26464.json"
}
],
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27032.json"
}
],
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27034.json"
}
],
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27042 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27042.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27056 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27061 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32321.json"
}
],
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32323 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32323.json"
}
],
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32324 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32324.json"
}
],
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32325.json"
}
],
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32326.json"
}
],
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32327.json"
}
],
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32330.json"
}
],
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32331.json"
}
],
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32332.json"
}
],
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32333.json"
}
],
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32345 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32345.json"
}
],
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32346.json"
}
],
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32347.json"
}
],
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32349.json"
}
],
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32350.json"
}
],
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38352 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38352.json"
}
],
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46708.json"
}
],
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46710.json"
}
],
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47317.json"
}
],
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47318.json"
}
],
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47326.json"
}
],
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47328.json"
}
],
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47329.json"
}
],
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48522 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48522.json"
}
],
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48523 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48523.json"
}
],
"title": "CVE-2025-48523"
},
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48524.json"
}
],
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48526 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48526.json"
}
],
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48527.json"
}
],
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48528 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48528.json"
}
],
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48529 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48529.json"
}
],
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48531 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48531.json"
}
],
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48532 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48532.json"
}
],
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48534.json"
}
],
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48535 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48535.json"
}
],
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48537 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48537.json"
}
],
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48538.json"
}
],
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48539 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48539.json"
}
],
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48540 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48540.json"
}
],
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48541 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48541.json"
}
],
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48542 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48542.json"
}
],
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48543 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48543.json"
}
],
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48544 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48544.json"
}
],
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48545 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48545.json"
}
],
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48546 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48546.json"
}
],
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48547.json"
}
],
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48548 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48548.json"
}
],
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48549 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48549.json"
}
],
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48550.json"
}
],
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48551.json"
}
],
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48552.json"
}
],
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48553.json"
}
],
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48554.json"
}
],
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48556.json"
}
],
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48558 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48558.json"
}
],
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48559.json"
}
],
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48560 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48560.json"
}
],
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48561.json"
}
],
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48562 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48562.json"
}
],
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48563 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48563.json"
}
],
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48581 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48581.json"
}
],
"title": "CVE-2025-48581"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.