Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21026 (GCVE-0-2025-21026)
Vulnerability from cvelistv5
Published
2025-09-03 06:05
Modified
2025-09-03 18:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.
References
| URL | Tags | ||
|---|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Samsung Mobile | Samsung Mobile Devices |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-21026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-03T18:22:34.794200Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T18:25:31.893Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Samsung Mobile Devices",
"vendor": "Samsung Mobile",
"versions": [
{
"status": "unaffected",
"version": "SMR Sep-2025 Release in Android 13, 14, 15, 16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-280: Improper handling of insufficient permission",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T06:05:30.967Z",
"orgId": "3af57064-a867-422c-b2ad-40307b65c458",
"shortName": "SamsungMobile"
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
"assignerShortName": "SamsungMobile",
"cveId": "CVE-2025-21026",
"datePublished": "2025-09-03T06:05:30.967Z",
"dateReserved": "2024-11-06T02:30:14.884Z",
"dateUpdated": "2025-09-03T18:25:31.893Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-21026\",\"sourceIdentifier\":\"mobile.security@samsung.com\",\"published\":\"2025-09-03T06:15:45.157\",\"lastModified\":\"2025-09-11T21:21:25.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"mobile.security@samsung.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A123EDB1-3048-44B0-8D4D-39A2B24B5F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE4D65E-8F9B-4810-AED6-95564A97D741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"70825981-F895-4BFD-9B6E-92BFF0D67023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E68B7B-BA08-4E8C-B60A-B3836C6986BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC42E785-02BF-4F27-B5CF-49572A2DBC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6239D93F-CA0E-4120-96A1-FB63276EAEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F19D02-1FFC-48AF-9CB8-063C459E7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD382E2D-0B51-4908-989A-88E083FC85BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"299284DA-85AB-4162-B858-E67E5C6C14F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38B7AB56-AB65-4557-A91C-40CA2FD12351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"858B0736-2272-4D5A-A77F-47023D21F7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D507C0-086B-4139-A560-126964DFA579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98F307E-3B01-4C17-86E5-1C6299919417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"952CA843-7CF0-4424-BDA4-3F2A93E077B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F64BAA-2E49-4919-A940-219391383D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B125ED-D939-4CBC-9E96-BBCF02402A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7DA96D-9C25-4DDA-A6BF-D998AC346B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AC19C6-D245-4C3A-90CC-A931A901EA0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA1685E-D101-46F6-8857-7F0894E07748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF85AA7B-E1C7-4946-92B4-E4D545CAACDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34114DDC-DCDA-4306-8D23-2E628873171F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6871BC1-19F4-4F0C-88D8-4000590D8D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4684DF1E-B783-4C81-A3D0-D09AD2610866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA72654-2389-4709-BC70-59EC4349A826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E346DCBD-7DEB-464F-B917-8624BE87D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B2D31-B8C3-4CC2-9B0A-E4FDC105AC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C89A24-B07F-43D2-AE83-8F4F03D6C114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F73D594-178F-4FC8-9F40-0E545E2647B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5697984D-08BA-412F-9BDF-26B658B0ADBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B97155-E841-4267-9522-A81F8B139A79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4187BA1-226E-4976-A642-2F6DAE85538E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3EF3F1-4E54-46E3-A308-69656A29FBD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F22C26-52FC-42A7-B263-0CC7770A8C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB4C4CE-7B3C-4573-87CD-28FC67B777FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB2B338-5E04-4136-939F-749A3B163656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B24866-2B3A-4A1A-8B75-EF7A7541797A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D30C02C-91FB-4D29-AF49-7903158E8FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5CA412-BAAF-4378-8ECD-95A404D4E19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB29F18-A929-432B-B20C-365401E6CA12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6D9064-844B-4D3F-AAE4-D170DF45EF8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C908A5B3-C47B-4DA1-A62F-F8FD77FF960D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C17A088-2CA1-4818-940F-2FEFA881D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C581B7EE-CD08-4D6E-8858-EA8FA631F84C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD187E2-2655-407D-87F9-135A9D45F783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBFF102-91A9-4BCC-BB43-912896BFCCEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB2A0D7-8F4F-4128-AE09-D2658D793BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F58ACB0-BA2B-4AFE-91DC-32CBD70DFD73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"401980A7-E64A-4773-83EB-C93B50AE0F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E12AB0B-728A-4478-B237-78CBAA2A44C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EEF3EC-643F-4A39-8F4C-11F0F534B589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0501033A-0D51-41E8-91A9-E72B6EE3F78D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A901EFE-90BA-474C-88D2-8A3E7D99C0E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7B3213-520A-49F0-A183-C73A37A56854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB6398C-6A3E-4146-9A5C-595BE36047BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F706F3-34F6-4D43-AE5E-C202C700A333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8B9CD3-063E-481E-BE7C-1628ADA71849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"12C17130-A0C0-49E1-8525-9D65F0275270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E010EDC6-D78E-4126-92B0-2F6A10DE76AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAA7790-A323-4ECA-834E-F19E59C571F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CE09EF7-B024-4D79-9400-C8223CDFBB86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C339A665-413D-443F-AD04-F71C161235D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB47786E-68AB-4FF1-B9D9-925D65702E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"213AC4D5-3B95-4120-B72D-A9327BADE2BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DCB465-A0F7-496E-BE45-0B5FA1508D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EFD2CA-22E5-4B7A-AC7E-8F86A3C52F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D65C03E-7BC3-491A-8621-A8C93FBA0A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECB0B7A-590C-460C-878B-9A78CB37D259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66CF415-6C4A-4AF3-B660-B2E9CF484B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"427A79D5-04E9-46BC-9D8C-471EBD28AAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B5B670-ACDE-4A64-97C5-358D79C65080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFE015F-8130-4F10-A553-420F0BB2A132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"141E541B-8FA5-4829-A413-4F1DC19E9AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFCA253F-EE13-4C52-8CB7-D72C117576D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CE3494-F7C0-497B-8491-107D31C9A91F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEA385E-3931-4438-A2A9-0357651F9B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57CB118-46CC-4CE8-ACC3-A806CD2C25A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFE0612-FA2E-4629-AE05-33245F1282FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F3023F-E65C-4871-A65A-738EFF64D365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD1F78D-EA98-4825-A0EA-703196DDE5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDB3FBE-99EC-4763-961B-2C436D864A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5746517-D8FF-4819-9B98-D06B475C6CDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B02110E-71FB-495F-86CA-F2A4E55C0E42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"931CC6D7-A42D-4482-B901-B539DFF89C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"852A1BEC-438F-4D1E-B361-87BD57D50157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DE4E96-2F23-47E5-9DFC-44EC409F37E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3F31FA-359F-4CB6-9078-CD2093D4C43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4207B265-009B-4FF8-85C5-01EBDB7701FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BADD79-26FC-4498-AFEC-C79AF6B96924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A695EEE-B9DE-4448-BC51-AF5AC592AA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC6E2318-BD4E-4540-82C3-0D461C691119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFC99BC-87AC-43AC-B815-36B7960C39D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD6766A-EC2B-4CA2-9A8E-2BA5C9E9ECF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C86A3033-9DD1-47F9-B95D-10F82A31D335\"}]}]}],\"references\":[{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-21026\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-03T18:22:34.794200Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-03T18:25:27.743Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Samsung Mobile\", \"product\": \"Samsung Mobile Devices\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"SMR Sep-2025 Release in Android 13, 14, 15, 16\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-280: Improper handling of insufficient permission\"}]}], \"providerMetadata\": {\"orgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"shortName\": \"SamsungMobile\", \"dateUpdated\": \"2025-09-03T06:05:30.967Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-21026\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-03T18:25:31.893Z\", \"dateReserved\": \"2024-11-06T02:30:14.884Z\", \"assignerOrgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"datePublished\": \"2025-09-03T06:05:30.967Z\", \"assignerShortName\": \"SamsungMobile\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ghsa-gjvm-23w4-3q2x
Vulnerability from github
Published
2025-09-11 21:31
Modified
2025-09-11 21:31
Severity ?
VLAI Severity ?
Details
Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.
{
"affected": [],
"aliases": [
"CVE-2025-21026"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-03T06:15:45Z",
"severity": "LOW"
},
"details": "Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.",
"id": "GHSA-gjvm-23w4-3q2x",
"modified": "2025-09-11T21:31:54Z",
"published": "2025-09-11T21:31:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21026"
},
{
"type": "WEB",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
ncsc-2025-0273
Vulnerability from csaf_ncscnl
Published
2025-09-04 08:15
Modified
2025-09-04 08:15
Summary
Kwetsbaarheden verholpen in Google Android en Samsung Mobile
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.
Interpretaties
De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.
Naast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.
Google meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.
Oplossingen
Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.
Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-20
Improper Input Validation
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-129
Improper Validation of Array Index
CWE-131
Incorrect Calculation of Buffer Size
CWE-142
Improper Neutralization of Value Delimiters
CWE-280
Improper Handling of Insufficient Permissions or Privileges
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-300
Channel Accessible by Non-Endpoint
CWE-326
Inadequate Encryption Strength
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-371
CWE-371
CWE-404
Improper Resource Shutdown or Release
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-617
Reachable Assertion
CWE-668
Exposure of Resource to Wrong Sphere
CWE-787
Out-of-bounds Write
CWE-823
Use of Out-of-range Pointer Offset
CWE-862
Missing Authorization
CWE-863
Incorrect Authorization
CWE-1422
Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.\n\nNaast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.\n\nGoogle meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.\n\nZie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Value Delimiters",
"title": "CWE-142"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
},
{
"category": "external",
"summary": "Reference",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-09-04T08:15:14.806733Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0273",
"initial_release_date": "2025-09-04T08:15:14.806733Z",
"revision_history": [
{
"date": "2025-09-04T08:15:14.806733Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13 \u003c2025-09-05",
"product": {
"name": "vers:unknown/13 \u003c2025-09-05",
"product_id": "CSAFPID-3094337"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14 \u003c2025-09-05",
"product": {
"name": "vers:unknown/14 \u003c2025-09-05",
"product_id": "CSAFPID-3094338"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15 \u003c2025-09-05",
"product": {
"name": "vers:unknown/15 \u003c2025-09-05",
"product_id": "CSAFPID-3094335"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16 \u003c2025-09-05",
"product": {
"name": "vers:unknown/16 \u003c2025-09-05",
"product_id": "CSAFPID-3094336"
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product_id": "CSAFPID-3094178"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product_id": "CSAFPID-3094177"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product_id": "CSAFPID-3094180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product_id": "CSAFPID-3094179"
}
}
],
"category": "product_name",
"name": "Samsung Mobile Devices"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39810 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-39810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24023 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-24023.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-7881",
"cwe": {
"id": "CWE-1422",
"name": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2024-47898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47898 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47898.json"
}
],
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47899 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47899.json"
}
],
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49714.json"
}
],
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0076 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0076.json"
}
],
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0089 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0089.json"
}
],
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-0467",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0467 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1706.json"
}
],
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3212 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3212.json"
}
],
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-8109",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8109 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8109.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2025-20696",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20696.json"
}
],
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20703.json"
}
],
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20704.json"
}
],
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20708.json"
}
],
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21025",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21025 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21025"
},
{
"cve": "CVE-2025-21026",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21026 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21026.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21026"
},
{
"cve": "CVE-2025-21027",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21027 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21027"
},
{
"cve": "CVE-2025-21028",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21028 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21028"
},
{
"cve": "CVE-2025-21029",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21029 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21029.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21029"
},
{
"cve": "CVE-2025-21030",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21030 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21030"
},
{
"cve": "CVE-2025-21031",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21031 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21031"
},
{
"cve": "CVE-2025-21032",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21032"
},
{
"cve": "CVE-2025-21033",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21033 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21033"
},
{
"cve": "CVE-2025-21034",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21034.json"
}
],
"title": "CVE-2025-21034"
},
{
"cve": "CVE-2025-21427",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21432.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21433.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21449.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21477 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21481.json"
}
],
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21482 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21482.json"
}
],
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21483 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21483.json"
}
],
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21484 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21484.json"
}
],
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21487.json"
}
],
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21488 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21488.json"
}
],
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21755.json"
}
],
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25179 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25179.json"
}
],
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25180 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25180.json"
}
],
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26454.json"
}
],
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26464.json"
}
],
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27032.json"
}
],
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27034.json"
}
],
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27042 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27042.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27056 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27061 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32321.json"
}
],
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32323 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32323.json"
}
],
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32324 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32324.json"
}
],
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32325.json"
}
],
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32326.json"
}
],
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32327.json"
}
],
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32330.json"
}
],
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32331.json"
}
],
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32332.json"
}
],
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32333.json"
}
],
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32345 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32345.json"
}
],
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32346.json"
}
],
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32347.json"
}
],
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32349.json"
}
],
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32350.json"
}
],
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38352 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38352.json"
}
],
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46708.json"
}
],
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46710.json"
}
],
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47317.json"
}
],
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47318.json"
}
],
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47326.json"
}
],
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47328.json"
}
],
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47329.json"
}
],
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48522 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48522.json"
}
],
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48523 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48523.json"
}
],
"title": "CVE-2025-48523"
},
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48524.json"
}
],
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48526 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48526.json"
}
],
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48527.json"
}
],
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48528 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48528.json"
}
],
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48529 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48529.json"
}
],
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48531 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48531.json"
}
],
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48532 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48532.json"
}
],
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48534.json"
}
],
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48535 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48535.json"
}
],
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48537 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48537.json"
}
],
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48538.json"
}
],
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48539 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48539.json"
}
],
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48540 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48540.json"
}
],
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48541 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48541.json"
}
],
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48542 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48542.json"
}
],
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48543 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48543.json"
}
],
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48544 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48544.json"
}
],
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48545 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48545.json"
}
],
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48546 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48546.json"
}
],
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48547.json"
}
],
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48548 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48548.json"
}
],
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48549 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48549.json"
}
],
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48550.json"
}
],
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48551.json"
}
],
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48552.json"
}
],
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48553.json"
}
],
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48554.json"
}
],
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48556.json"
}
],
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48558 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48558.json"
}
],
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48559.json"
}
],
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48560 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48560.json"
}
],
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48561.json"
}
],
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48562 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48562.json"
}
],
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48563 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48563.json"
}
],
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48581 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48581.json"
}
],
"title": "CVE-2025-48581"
}
]
}
fkie_cve-2025-21026
Vulnerability from fkie_nvd
Published
2025-09-03 06:15
Modified
2025-09-11 21:21
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "AC42E785-02BF-4F27-B5CF-49572A2DBC8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "25F19D02-1FFC-48AF-9CB8-063C459E7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "858B0736-2272-4D5A-A77F-47023D21F7D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "39F64BAA-2E49-4919-A940-219391383D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FDA1685E-D101-46F6-8857-7F0894E07748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "4684DF1E-B783-4C81-A3D0-D09AD2610866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "C35B2D31-B8C3-4CC2-9B0A-E4FDC105AC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "72B97155-E841-4267-9522-A81F8B139A79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "7EB4C4CE-7B3C-4573-87CD-28FC67B777FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2F5CA412-BAAF-4378-8ECD-95A404D4E19B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F58ACB0-BA2B-4AFE-91DC-32CBD70DFD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "26EEF3EC-643F-4A39-8F4C-11F0F534B589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "9AB6398C-6A3E-4146-9A5C-595BE36047BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "E010EDC6-D78E-4126-92B0-2F6A10DE76AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "EB47786E-68AB-4FF1-B9D9-925D65702E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "52EFD2CA-22E5-4B7A-AC7E-8F86A3C52F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "427A79D5-04E9-46BC-9D8C-471EBD28AAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FFCA253F-EE13-4C52-8CB7-D72C117576D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "CEFE0612-FA2E-4629-AE05-33245F1282FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B5746517-D8FF-4819-9B98-D06B475C6CDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*",
"matchCriteriaId": "95DE4E96-2F23-47E5-9DFC-44EC409F37E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "AB3F31FA-359F-4CB6-9078-CD2093D4C43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "4207B265-009B-4FF8-85C5-01EBDB7701FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "B9BADD79-26FC-4498-AFEC-C79AF6B96924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "3A695EEE-B9DE-4448-BC51-AF5AC592AA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FC6E2318-BD4E-4540-82C3-0D461C691119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "DDFC99BC-87AC-43AC-B815-36B7960C39D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3FD6766A-EC2B-4CA2-9A8E-2BA5C9E9ECF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "C86A3033-9DD1-47F9-B95D-10F82A31D335",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call."
}
],
"id": "CVE-2025-21026",
"lastModified": "2025-09-11T21:21:25.810",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4,
"source": "mobile.security@samsung.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-03T06:15:45.157",
"references": [
{
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
],
"sourceIdentifier": "mobile.security@samsung.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…