Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-26635 (GCVE-0-2025-26635)
Vulnerability from cvelistv5
- CWE-1390 - Weak Authentication
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635 | Vendor Advisory |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.7136 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26635", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:13:14.298237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:16:07.405Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows 10 Version 1809", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.7136", "status": "affected", "version": "10.0.17763.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.7136", "status": "affected", "version": "10.0.17763.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.7136", "status": "affected", "version": "10.0.17763.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.20348.3453", "status": "affected", "version": "10.0.20348.0", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems" ], "product": "Windows 10 Version 21H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19044.5737", "status": "affected", "version": "10.0.19044.0", "versionType": "custom" } ] }, { "platforms": [ "ARM64-based Systems", "x64-based Systems" ], "product": "Windows 11 version 22H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.22621.5189", "status": "affected", "version": "10.0.22621.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems" ], "product": "Windows 10 Version 22H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19045.5737", "status": "affected", "version": "10.0.19045.0", "versionType": "custom" } ] }, { "platforms": [ "ARM64-based Systems" ], "product": "Windows 11 version 22H3", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.22631.5189", "status": "affected", "version": "10.0.22631.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows 11 Version 23H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.22631.5189", "status": "affected", "version": "10.0.22631.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022, 23H2 Edition (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.25398.1551", "status": "affected", "version": "10.0.25398.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.17763.7136", "versionStartIncluding": "10.0.17763.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.7136", "versionStartIncluding": "10.0.17763.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.7136", "versionStartIncluding": "10.0.17763.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.20348.3453", "versionStartIncluding": "10.0.20348.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19044.5737", "versionStartIncluding": "10.0.19044.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22621.5189", "versionStartIncluding": "10.0.22621.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.5737", "versionStartIncluding": "10.0.19045.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22631.5189", "versionStartIncluding": "10.0.22631.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22631.5189", "versionStartIncluding": "10.0.22631.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.25398.1551", "versionStartIncluding": "10.0.25398.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2025-04-08T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1390", "description": "CWE-1390: Weak Authentication", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-04T17:52:57.346Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Windows Hello Security Feature Bypass Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635" } ], "title": "Windows Hello Security Feature Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2025-26635", "datePublished": "2025-04-08T17:23:44.337Z", "dateReserved": "2025-02-12T19:23:29.268Z", "dateUpdated": "2025-06-04T17:52:57.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-26635\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-04-08T18:15:47.337\",\"lastModified\":\"2025-07-03T13:00:05.107\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.\"},{\"lang\":\"es\",\"value\":\"La autenticaci\u00f3n d\u00e9bil en Windows Hello permite que un atacante autorizado eluda una funci\u00f3n de seguridad en una red.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1390\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"13A4A79D-8D45-48FA-84F5-CE1A78E8E424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"03AB53EC-354E-4F30-A278-2835CA341503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19044.5737\",\"matchCriteriaId\":\"2ACCA6F4-C140-4B2E-93FF-1B9DC093E831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19045.5737\",\"matchCriteriaId\":\"09E0970D-79B9-40D9-BFFF-25EE5A686B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.22621.5189\",\"matchCriteriaId\":\"350A5C83-A85B-4CC1-81C6-F36C1BE0687E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.22621.5189\",\"matchCriteriaId\":\"AAB1352F-725F-427E-A3F3-73A48287D0C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.22631.5189\",\"matchCriteriaId\":\"0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.22631.5189\",\"matchCriteriaId\":\"1718BEDA-0AF8-4A6D-B053-AE746C7617C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"D2941A94-927C-4393-B2A0-4630F03B8B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.3453\",\"matchCriteriaId\":\"52706BEC-E3D6-4188-BB88-7078FE4AF970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.25398.1551\",\"matchCriteriaId\":\"0B42570D-5CFB-4620-8B06-B5752212709A\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-26635\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-08T20:13:14.298237Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-08T20:04:24.464Z\"}}], \"cna\": {\"title\": \"Windows Hello Security Feature Bypass Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1809\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.20348.0\", \"lessThan\": \"10.0.20348.3453\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 21H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.19044.0\", \"lessThan\": \"10.0.19044.5737\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"ARM64-based Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22621.0\", \"lessThan\": \"10.0.22621.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.19045.0\", \"lessThan\": \"10.0.19045.5737\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-based Systems\", \"32-bit Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H3\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22631.0\", \"lessThan\": \"10.0.22631.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 Version 23H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22631.0\", \"lessThan\": \"10.0.22631.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022, 23H2 Edition (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.25398.0\", \"lessThan\": \"10.0.25398.1551\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}], \"datePublic\": \"2025-04-08T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635\", \"name\": \"Windows Hello Security Feature Bypass Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-1390\", \"description\": \"CWE-1390: Weak Authentication\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.20348.3453\", \"versionStartIncluding\": \"10.0.20348.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.19044.5737\", \"versionStartIncluding\": \"10.0.19044.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22621.5189\", \"versionStartIncluding\": \"10.0.22621.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.19045.5737\", \"versionStartIncluding\": \"10.0.19045.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22631.5189\", \"versionStartIncluding\": \"10.0.22631.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22631.5189\", \"versionStartIncluding\": \"10.0.22631.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.25398.1551\", \"versionStartIncluding\": \"10.0.25398.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-06-04T17:52:57.346Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-26635\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-04T17:52:57.346Z\", \"dateReserved\": \"2025-02-12T19:23:29.268Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-04-08T17:23:44.337Z\", \"assignerShortName\": \"microsoft\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
cnvd-2025-07780
Vulnerability from cnvd
Title: Microsoft Windows Hello安全功能绕过漏洞(CNVD-2025-07780)
Description:
Microsoft Windows Hello是登录Windows设备的一种更个性化、更安全的方式。
Microsoft Windows Hello存在安全功能绕过漏洞,攻击者可利用该漏洞绕过某些功能。
Severity: 高
Patch Name: Microsoft Windows Hello安全功能绕过漏洞(CNVD-2025-07780)的补丁
Patch Description:
Microsoft Windows Hello是登录Windows设备的一种更个性化、更安全的方式。
Microsoft Windows Hello存在安全功能绕过漏洞,攻击者可利用该漏洞绕过某些功能。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26635
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26635
Name | ['Microsoft Windows Server 2019', 'Microsoft Windows 10 1809', 'Microsoft Windows Server 2022', 'Microsoft Windows 10 21H2', 'Microsoft Windows 11 22H2', 'Microsoft Windows 10 22H2', 'Microsoft Windows 11 23H2', 'Microsoft Windows 11 22H3'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2025-26635", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-26635" } }, "description": "Microsoft Windows Hello\u662f\u767b\u5f55Windows\u8bbe\u5907\u7684\u4e00\u79cd\u66f4\u4e2a\u6027\u5316\u3001\u66f4\u5b89\u5168\u7684\u65b9\u5f0f\u3002\n\nMicrosoft Windows Hello\u5b58\u5728\u5b89\u5168\u529f\u80fd\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u67d0\u4e9b\u529f\u80fd\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26635", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2025-07780", "openTime": "2025-04-18", "patchDescription": "Microsoft Windows Hello\u662f\u767b\u5f55Windows\u8bbe\u5907\u7684\u4e00\u79cd\u66f4\u4e2a\u6027\u5316\u3001\u66f4\u5b89\u5168\u7684\u65b9\u5f0f\u3002\r\n\r\nMicrosoft Windows Hello\u5b58\u5728\u5b89\u5168\u529f\u80fd\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u67d0\u4e9b\u529f\u80fd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Microsoft Windows Hello\u5b89\u5168\u529f\u80fd\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-07780\uff09\u7684\u8865\u4e01", "products": { "product": [ "Microsoft Windows Server 2019", "Microsoft Windows 10 1809", "Microsoft Windows Server 2022", "Microsoft Windows 10 21H2", "Microsoft Windows 11 22H2", "Microsoft Windows 10 22H2", "Microsoft Windows 11 23H2", "Microsoft Windows 11 22H3" ] }, "referenceLink": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26635", "serverity": "\u9ad8", "submitTime": "2025-04-09", "title": "Microsoft Windows Hello\u5b89\u5168\u529f\u80fd\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-07780\uff09" }
ncsc-2025-0112
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- Uitvoer van willekeurige code (root/adminrechten)\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Verkrijgen van verhoogde rechten\n- Toegang tot gevoelige gegevens\n- Voordoen als andere gebruiker\n\nVan de kwetsbaarheid met kenmerk CVE-2025-29824 geeft Microsoft aan dat deze eerder actief is misbruikt als zero-day. Er is geen publieke Proof-of-Concept (PoC) of exploitcode bekend. Een kwaadwillende die met succes deze kwetsbaarheid misbruikt, zou SYSTEM-rechten kunnen verkrijgen.\n\n```\nWindows Subsystem for Linux: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26675 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows upnphost.dll: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26665 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27472 | 5,40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26671 | 8,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Update Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21204 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27475 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29811 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27470 | 7,50 | Denial-of-Service | \n| CVE-2025-27486 | 7,50 | Denial-of-Service | \n| CVE-2025-26652 | 7,50 | Denial-of-Service | \n| CVE-2025-26680 | 7,50 | Denial-of-Service | \n| CVE-2025-27485 | 7,50 | Denial-of-Service | \n| CVE-2025-21174 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Digital Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26640 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27467 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27476 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27730 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26648 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27739 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27487 | 8,00 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27735 | 6,00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27728 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27738 | 6,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Active Directory Certificate Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27740 | 8,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Power Dependency Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27736 | 5,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27727 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Bluetooth Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27490 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26635 | 6,50 | Omzeilen van beveiligingsmaatregel | \n| CVE-2025-26644 | 6,20 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority (LSA): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21191 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27478 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRPC Endpoint Mapper Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26679 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29809 | 7,10 | Omzeilen van beveiligingsmaatregel | \n| CVE-2025-26647 | 8,10 | Voordoen als andere gebruiker | \n| CVE-2025-27479 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26641 | 7,50 | Denial-of-Service | \n| CVE-2025-29808 | 5,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27483 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27742 | 5,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-21197 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-27733 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27741 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26667 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26672 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26676 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-27474 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-21203 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26664 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26668 | 7,50 | Uitvoeren van willekeurige code | \n| CVE-2025-26669 | 8,80 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27491 | 7,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27471 | 5,90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Kernel Memory: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29812 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Virtual Hard Drive: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26688 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Security Zone Mapping: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27737 | 8,60 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nOpenSSH for Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27731 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Secure Channel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27492 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-26649 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Gateway Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27480 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-27482 | 8,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26681 | 6,70 | Verkrijgen van verhoogde rechten | \n| CVE-2025-26687 | 7,50 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27732 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26666 | 7,80 | Uitvoeren van willekeurige code | \n| CVE-2025-26674 | 7,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29824 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows HTTP.sys: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27473 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Local Session Manager (LSM): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26651 | 6,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows USB Print Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26639 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26686 | 7,50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows LDAP - Lightweight Directory Access Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26670 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-27469 | 7,50 | Denial-of-Service | \n| CVE-2025-26663 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-26673 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Universal Plug and Play (UPnP) Device Host: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27484 | 7,50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Telephony Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21205 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-21221 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-21222 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-27477 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-27481 | 8,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-24073 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24062 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24058 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24074 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24060 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26637 | 6,80 | Omzeilen van beveiligingsmaatregel, Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Defender Application Control (WDAC): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26678 | 8,40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27729 | 7,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nActive Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29810 | 7,50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```\n", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" }, { "category": "general", "text": "Use of a Cryptographic Primitive with a Risky Implementation", "title": "CWE-1240" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Weak Authentication", "title": "CWE-1390" }, { "category": "general", "text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism", "title": "CWE-1039" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Insufficient Resource Pool", "title": "CWE-410" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2025-04-08T18:57:53.660384Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0112", "initial_release_date": "2025-04-08T18:57:53.660384Z", "revision_history": [ { "date": "2025-04-08T18:57:53.660384Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1560265", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*" } } } ], "category": "product_name", "name": "Microsoft Office for Android" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1560266", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*" } } } ], "category": "product_name", "name": "Microsoft Office for Universal" } ], "category": "product_family", "name": "Microsoft Office" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1440176", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*" } } } ], "category": "product_name", "name": "Remote Desktop client for Windows Desktop" }, { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-1332109" } }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.7970", "product": { "name": "vers:microsoft/10.0.14393.7970", "product_id": "CSAFPID-2633264", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1607 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.7970", "product": { "name": "vers:microsoft/10.0.14393.7970", "product_id": "CSAFPID-2633265", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1607 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7137", "product": { "name": "vers:microsoft/10.0.17763.7137", "product_id": "CSAFPID-2633241", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1809 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7137", "product": { "name": "vers:microsoft/10.0.17763.7137", "product_id": "CSAFPID-2633242", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 1809 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5737", "product": { "name": "vers:microsoft/10.0.19044.5737", "product_id": "CSAFPID-2633247", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5737", "product": { "name": "vers:microsoft/10.0.19044.5737", "product_id": "CSAFPID-2633248", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19044.5737", "product": { "name": "vers:microsoft/10.0.19044.5737", "product_id": "CSAFPID-2633249", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5737", "product": { "name": "vers:microsoft/10.0.19045.5737", "product_id": "CSAFPID-2633254", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5737", "product": { "name": "vers:microsoft/10.0.19045.5737", "product_id": "CSAFPID-2633253", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.19045.5737", "product": { "name": "vers:microsoft/10.0.19045.5737", "product_id": "CSAFPID-2633252", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-2633262", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows 10 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-2633263", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 10 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5191", "product": { "name": "vers:microsoft/10.0.22621.5191", "product_id": "CSAFPID-2633250", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5191", "product": { "name": "vers:microsoft/10.0.22621.5191", "product_id": "CSAFPID-2633251", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22621.5191", "product": { "name": "vers:microsoft/10.0.22621.5191", "product_id": "CSAFPID-2633256", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22621.5191:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.22631.5191", "product": { "name": "vers:microsoft/10.0.22631.5191", "product_id": "CSAFPID-2633257", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5191:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.3775", "product": { "name": "vers:microsoft/10.0.26100.3775", "product_id": "CSAFPID-2633259", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:arm64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 24H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.3775", "product": { "name": "vers:microsoft/10.0.26100.3775", "product_id": "CSAFPID-2633260", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows 11 Version 24H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/unknown", "product": { "name": "vers:microsoft/unknown", "product_id": "CSAFPID-1440177", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*" } } } ], "category": "product_name", "name": "Windows App Client for Windows Desktop" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.7970", "product": { "name": "vers:microsoft/10.0.14393.7970", "product_id": "CSAFPID-2633266", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2016" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.14393.7970", "product": { "name": "vers:microsoft/10.0.14393.7970", "product_id": "CSAFPID-2633267", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2016 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7137", "product": { "name": "vers:microsoft/10.0.17763.7137", "product_id": "CSAFPID-2633243", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2019" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.17763.7137", "product": { "name": "vers:microsoft/10.0.17763.7137", "product_id": "CSAFPID-2633244", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2019 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.20348.3454", "product": { "name": "vers:microsoft/10.0.20348.3454", "product_id": "CSAFPID-2633245", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.20348.3454", "product": { "name": "vers:microsoft/10.0.20348.3454", "product_id": "CSAFPID-2633246", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.25398.1551", "product": { "name": "vers:microsoft/10.0.25398.1551", "product_id": "CSAFPID-2633258", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1551:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2022, 23H2 Edition (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.3775", "product": { "name": "vers:microsoft/10.0.26100.3775", "product_id": "CSAFPID-2633261", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2025" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/10.0.26100.3775", "product": { "name": "vers:microsoft/10.0.26100.3775", "product_id": "CSAFPID-2633255", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Windows Server 2025 (Server Core installation)" } ], "category": "product_family", "name": "Windows" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.1.7601.27670", "product": { "name": "vers:microsoft/6.1.7601.27670", "product_id": "CSAFPID-2633272", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.1.7601.27670", "product": { "name": "vers:microsoft/6.1.7601.27670", "product_id": "CSAFPID-2633273", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23220", "product": { "name": "vers:microsoft/6.0.6003.23220", "product_id": "CSAFPID-2633268", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23220", "product": { "name": "vers:microsoft/6.0.6003.23220", "product_id": "CSAFPID-2633269", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23220", "product": { "name": "vers:microsoft/6.0.6003.23220", "product_id": "CSAFPID-2633270", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for x64-based Systems Service Pack 2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.0.6003.23220", "product": { "name": "vers:microsoft/6.0.6003.23220", "product_id": "CSAFPID-2633271", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*" } } } ], "category": "product_name", "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.2.9200.25423", "product": { "name": "vers:microsoft/6.2.9200.25423", "product_id": "CSAFPID-2633274", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.2.9200.25423", "product": { "name": "vers:microsoft/6.2.9200.25423", "product_id": "CSAFPID-2633275", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.3.9600.22523", "product": { "name": "vers:microsoft/6.3.9600.22523", "product_id": "CSAFPID-2633276", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 R2" }, { "branches": [ { "category": "product_version_range", "name": "vers:microsoft/6.3.9600.22523", "product": { "name": "vers:microsoft/6.3.9600.22523", "product_id": "CSAFPID-2633277", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*" } } } ], "category": "product_name", "name": "Windows Server 2012 R2 (Server Core installation)" } ], "category": "product_family", "name": "ESU" } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-21174", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21174.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21174" }, { "cve": "CVE-2025-21191", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21191" }, { "cve": "CVE-2025-21197", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21197", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21197.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21197" }, { "cve": "CVE-2025-21203", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21203", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21203.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21203" }, { "cve": "CVE-2025-21204", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21204", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21204.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21204" }, { "cve": "CVE-2025-21205", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21205", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21205.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21205" }, { "cve": "CVE-2025-21221", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21221", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21221.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21221" }, { "cve": "CVE-2025-21222", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21222", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21222.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-21222" }, { "cve": "CVE-2025-24058", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-24058" }, { "cve": "CVE-2025-24060", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-24060" }, { "cve": "CVE-2025-24062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-24062" }, { "cve": "CVE-2025-24073", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24073.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-24073" }, { "cve": "CVE-2025-24074", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24074.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-24074" }, { "cve": "CVE-2025-26635", "cwe": { "id": "CWE-1390", "name": "Weak Authentication" }, "notes": [ { "category": "other", "text": "Weak Authentication", "title": "CWE-1390" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26635", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26635.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26635" }, { "cve": "CVE-2025-26637", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26637", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26637.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26637" }, { "cve": "CVE-2025-26639", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26639", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26639.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26639" }, { "cve": "CVE-2025-26640", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26640", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26640.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26640" }, { "cve": "CVE-2025-26641", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26641", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26641.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26641" }, { "cve": "CVE-2025-26644", "cwe": { "id": "CWE-1039", "name": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism" }, "notes": [ { "category": "other", "text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism", "title": "CWE-1039" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26644", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26644.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26644" }, { "cve": "CVE-2025-26647", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26647", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26647.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26647" }, { "cve": "CVE-2025-26648", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26648", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26648.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26648" }, { "cve": "CVE-2025-26649", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26649", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26649.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26649" }, { "cve": "CVE-2025-26651", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26651", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26651.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26651" }, { "cve": "CVE-2025-26652", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26652", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26652.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26652" }, { "cve": "CVE-2025-26663", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26663", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26663.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26663" }, { "cve": "CVE-2025-26664", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26664", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26664.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26664" }, { "cve": "CVE-2025-26665", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26665", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26665.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26665" }, { "cve": "CVE-2025-26666", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26666", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26666.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26666" }, { "cve": "CVE-2025-26667", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26667", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26667.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26667" }, { "cve": "CVE-2025-26668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26668", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26668.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26668" }, { "cve": "CVE-2025-26669", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26669", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26669.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26669" }, { "cve": "CVE-2025-26670", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26670", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26670.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26670" }, { "cve": "CVE-2025-26671", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26671", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26671.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26671" }, { "cve": "CVE-2025-26672", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26672" }, { "cve": "CVE-2025-26673", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26673", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26673.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26673" }, { "cve": "CVE-2025-26674", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26674", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26674.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26674" }, { "cve": "CVE-2025-26675", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26675", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26675.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26675" }, { "cve": "CVE-2025-26676", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26676", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26676.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26676" }, { "cve": "CVE-2025-26678", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26678.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26678" }, { "cve": "CVE-2025-26679", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26679", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26679.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26679" }, { "cve": "CVE-2025-26680", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26680", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26680.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26680" }, { "cve": "CVE-2025-26681", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26681", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26681.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26681" }, { "cve": "CVE-2025-26686", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26686", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26686.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26686" }, { "cve": "CVE-2025-26687", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26687", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26687.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26687" }, { "cve": "CVE-2025-26688", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26688", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26688.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-26688" }, { "cve": "CVE-2025-27467", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27467", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27467.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27467" }, { "cve": "CVE-2025-27469", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27469" }, { "cve": "CVE-2025-27470", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27470", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27470.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27470" }, { "cve": "CVE-2025-27471", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27471.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27471" }, { "cve": "CVE-2025-27472", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27472" }, { "cve": "CVE-2025-27473", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27473" }, { "cve": "CVE-2025-27474", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27474" }, { "cve": "CVE-2025-27475", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27475" }, { "cve": "CVE-2025-27476", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27476" }, { "cve": "CVE-2025-27477", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27477" }, { "cve": "CVE-2025-27478", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27478", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27478.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27478" }, { "cve": "CVE-2025-27479", "cwe": { "id": "CWE-410", "name": "Insufficient Resource Pool" }, "notes": [ { "category": "other", "text": "Insufficient Resource Pool", "title": "CWE-410" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27479", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27479.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27479" }, { "cve": "CVE-2025-27480", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27480", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27480.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27480" }, { "cve": "CVE-2025-27481", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27481", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27481.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27481" }, { "cve": "CVE-2025-27482", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27482", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27482.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27482" }, { "cve": "CVE-2025-27483", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27483.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27483" }, { "cve": "CVE-2025-27484", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27484" }, { "cve": "CVE-2025-27485", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27485", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27485.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27485" }, { "cve": "CVE-2025-27486", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27486", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27486.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27486" }, { "cve": "CVE-2025-27487", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27487" }, { "cve": "CVE-2025-27490", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27490" }, { "cve": "CVE-2025-27491", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27491" }, { "cve": "CVE-2025-27492", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27492" }, { "cve": "CVE-2025-27727", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27727", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27727.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27727" }, { "cve": "CVE-2025-27728", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27728", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27728.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27728" }, { "cve": "CVE-2025-27729", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27729", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27729.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27729" }, { "cve": "CVE-2025-27730", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27730", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27730.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27730" }, { "cve": "CVE-2025-27731", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27731", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27731.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27731" }, { "cve": "CVE-2025-27732", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27732", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27732.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27732" }, { "cve": "CVE-2025-27733", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27733", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27733.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27733" }, { "cve": "CVE-2025-27735", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27735", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27735.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27735" }, { "cve": "CVE-2025-27736", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27736" }, { "cve": "CVE-2025-27737", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27737.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27737" }, { "cve": "CVE-2025-27738", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27738", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27738.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27738" }, { "cve": "CVE-2025-27739", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27739", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27739.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27739" }, { "cve": "CVE-2025-27740", "cwe": { "id": "CWE-1390", "name": "Weak Authentication" }, "notes": [ { "category": "other", "text": "Weak Authentication", "title": "CWE-1390" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27740", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27740.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27740" }, { "cve": "CVE-2025-27741", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27741" }, { "cve": "CVE-2025-27742", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27742", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27742.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-27742" }, { "cve": "CVE-2025-29808", "cwe": { "id": "CWE-1240", "name": "Use of a Cryptographic Primitive with a Risky Implementation" }, "notes": [ { "category": "other", "text": "Use of a Cryptographic Primitive with a Risky Implementation", "title": "CWE-1240" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29808", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29808.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29808" }, { "cve": "CVE-2025-29809", "cwe": { "id": "CWE-922", "name": "Insecure Storage of Sensitive Information" }, "notes": [ { "category": "other", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29809", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29809.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29809" }, { "cve": "CVE-2025-29810", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29810", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29810.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29810" }, { "cve": "CVE-2025-29811", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29811", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29811.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29811" }, { "cve": "CVE-2025-29812", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29812", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29812.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29812" }, { "cve": "CVE-2025-29824", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29824", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29824.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1560265", "CSAFPID-1560266", "CSAFPID-1440176", "CSAFPID-1332109", "CSAFPID-2633264", "CSAFPID-2633265", "CSAFPID-2633241", "CSAFPID-2633242", "CSAFPID-2633247", "CSAFPID-2633248", "CSAFPID-2633249", "CSAFPID-2633254", "CSAFPID-2633253", "CSAFPID-2633252", "CSAFPID-2633262", "CSAFPID-2633263", "CSAFPID-2633250", "CSAFPID-2633251", "CSAFPID-2633256", "CSAFPID-2633257", "CSAFPID-2633259", "CSAFPID-2633260", "CSAFPID-1440177", "CSAFPID-2633272", "CSAFPID-2633273", "CSAFPID-2633268", "CSAFPID-2633269", "CSAFPID-2633270", "CSAFPID-2633271", "CSAFPID-2633274", "CSAFPID-2633275", "CSAFPID-2633276", "CSAFPID-2633277", "CSAFPID-2633266", "CSAFPID-2633267", "CSAFPID-2633243", "CSAFPID-2633244", "CSAFPID-2633245", "CSAFPID-2633246", "CSAFPID-2633258", "CSAFPID-2633261", "CSAFPID-2633255" ] } ], "title": "CVE-2025-29824" } ] }
ghsa-cp6c-ff57-294g
Vulnerability from github
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
{ "affected": [], "aliases": [ "CVE-2025-26635" ], "database_specific": { "cwe_ids": [ "CWE-1390" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-04-08T18:15:47Z", "severity": "MODERATE" }, "details": "Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.", "id": "GHSA-cp6c-ff57-294g", "modified": "2025-04-08T18:34:45Z", "published": "2025-04-08T18:34:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26635" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2025-26635
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424", "versionEndExcluding": "10.0.17763.7136", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503", "versionEndExcluding": "10.0.17763.7136", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831", "versionEndExcluding": "10.0.19044.5737", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04", "versionEndExcluding": "10.0.19045.5737", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E", "versionEndExcluding": "10.0.22621.5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7", "versionEndExcluding": "10.0.22621.5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88", "versionEndExcluding": "10.0.22631.5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8", "versionEndExcluding": "10.0.22631.5189", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A", "versionEndExcluding": "10.0.17763.7136", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970", "versionEndExcluding": "10.0.20348.3453", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", "matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A", "versionEndExcluding": "10.0.25398.1551", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network." }, { "lang": "es", "value": "La autenticaci\u00f3n d\u00e9bil en Windows Hello permite que un atacante autorizado eluda una funci\u00f3n de seguridad en una red." } ], "id": "CVE-2025-26635", "lastModified": "2025-07-03T13:00:05.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "secure@microsoft.com", "type": "Secondary" } ] }, "published": "2025-04-08T18:15:47.337", "references": [ { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1390" } ], "source": "secure@microsoft.com", "type": "Secondary" } ] }
msrc_cve-2025-26635
Vulnerability from csaf_microsoft
Notes
{ "document": { "acknowledgments": [ { "names": [ "Eduardo Barrera with Microsoft" ] } ], "aggregate_severity": { "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Public", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.", "title": "Disclaimer" }, { "category": "general", "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.", "title": "Customer Action" } ], "publisher": { "category": "vendor", "contact_details": "secure@microsoft.com", "name": "Microsoft Security Response Center", "namespace": "https://msrc.microsoft.com" }, "references": [ { "category": "self", "summary": "CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635" }, { "category": "self", "summary": "CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-26635.json" }, { "category": "external", "summary": "Microsoft Exploitability Index", "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1" }, { "category": "external", "summary": "Microsoft Support Lifecycle", "url": "https://support.microsoft.com/lifecycle" }, { "category": "external", "summary": "Common Vulnerability Scoring System", "url": "https://www.first.org/cvss" } ], "title": "Windows Hello Security Feature Bypass Vulnerability", "tracking": { "current_release_date": "2025-04-08T07:00:00.000Z", "generator": { "date": "2025-07-22T19:57:31.452Z", "engine": { "name": "MSRC Generator", "version": "1.0" } }, "id": "msrc_CVE-2025-26635", "initial_release_date": "2025-04-08T07:00:00.000Z", "revision_history": [ { "date": "2025-04-08T07:00:00.000Z", "legacy_version": "1", "number": "1", "summary": "Information published." } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.17763.7136", "product": { "name": "Windows 10 Version 1809 for 32-bit Systems \u003c10.0.17763.7136", "product_id": "17" } }, { "category": "product_version", "name": "10.0.17763.7136", "product": { "name": "Windows 10 Version 1809 for 32-bit Systems 10.0.17763.7136", "product_id": "11568" } } ], "category": "product_name", "name": "Windows 10 Version 1809 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.17763.7136", "product": { "name": "Windows 10 Version 1809 for x64-based Systems \u003c10.0.17763.7136", "product_id": "16" } }, { "category": "product_version", "name": "10.0.17763.7136", "product": { "name": "Windows 10 Version 1809 for x64-based Systems 10.0.17763.7136", "product_id": "11569" } } ], "category": "product_name", "name": "Windows 10 Version 1809 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.17763.7136", "product": { "name": "Windows Server 2019 \u003c10.0.17763.7136", "product_id": "15" } }, { "category": "product_version", "name": "10.0.17763.7136", "product": { "name": "Windows Server 2019 10.0.17763.7136", "product_id": "11571" } } ], "category": "product_name", "name": "Windows Server 2019" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.17763.7136", "product": { "name": "Windows Server 2019 (Server Core installation) \u003c10.0.17763.7136", "product_id": "14" } }, { "category": "product_version", "name": "10.0.17763.7136", "product": { "name": "Windows Server 2019 (Server Core installation) 10.0.17763.7136", "product_id": "11572" } } ], "category": "product_name", "name": "Windows Server 2019 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.20348.3453", "product": { "name": "Windows Server 2022 \u003c10.0.20348.3453", "product_id": "13" } }, { "category": "product_version", "name": "10.0.20348.3453", "product": { "name": "Windows Server 2022 10.0.20348.3453", "product_id": "11923" } } ], "category": "product_name", "name": "Windows Server 2022" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.20348.3453", "product": { "name": "Windows Server 2022 (Server Core installation) \u003c10.0.20348.3453", "product_id": "12" } }, { "category": "product_version", "name": "10.0.20348.3453", "product": { "name": "Windows Server 2022 (Server Core installation) 10.0.20348.3453", "product_id": "11924" } } ], "category": "product_name", "name": "Windows Server 2022 (Server Core installation)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for 32-bit Systems \u003c10.0.19044.5737", "product_id": "11" } }, { "category": "product_version", "name": "10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for 32-bit Systems 10.0.19044.5737", "product_id": "11929" } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for ARM64-based Systems \u003c10.0.19044.5737", "product_id": "10" } }, { "category": "product_version", "name": "10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.5737", "product_id": "11930" } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for x64-based Systems \u003c10.0.19044.5737", "product_id": "9" } }, { "category": "product_version", "name": "10.0.19044.5737", "product": { "name": "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.5737", "product_id": "11931" } } ], "category": "product_name", "name": "Windows 10 Version 21H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.22621.5189", "product": { "name": "Windows 11 Version 22H2 for ARM64-based Systems \u003c10.0.22621.5189", "product_id": "8" } }, { "category": "product_version", "name": "10.0.22621.5189", "product": { "name": "Windows 11 Version 22H2 for ARM64-based Systems 10.0.22621.5189", "product_id": "12085" } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.22621.5189", "product": { "name": "Windows 11 Version 22H2 for x64-based Systems \u003c10.0.22621.5189", "product_id": "7" } }, { "category": "product_version", "name": "10.0.22621.5189", "product": { "name": "Windows 11 Version 22H2 for x64-based Systems 10.0.22621.5189", "product_id": "12086" } } ], "category": "product_name", "name": "Windows 11 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for x64-based Systems \u003c10.0.19045.5737", "product_id": "6" } }, { "category": "product_version", "name": "10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for x64-based Systems 10.0.19045.5737", "product_id": "12097" } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for ARM64-based Systems \u003c10.0.19045.5737", "product_id": "5" } }, { "category": "product_version", "name": "10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for ARM64-based Systems 10.0.19045.5737", "product_id": "12098" } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for 32-bit Systems \u003c10.0.19045.5737", "product_id": "4" } }, { "category": "product_version", "name": "10.0.19045.5737", "product": { "name": "Windows 10 Version 22H2 for 32-bit Systems 10.0.19045.5737", "product_id": "12099" } } ], "category": "product_name", "name": "Windows 10 Version 22H2 for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.22631.5189", "product": { "name": "Windows 11 Version 23H2 for ARM64-based Systems \u003c10.0.22631.5189", "product_id": "3" } }, { "category": "product_version", "name": "10.0.22631.5189", "product": { "name": "Windows 11 Version 23H2 for ARM64-based Systems 10.0.22631.5189", "product_id": "12242" } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for ARM64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.22631.5189", "product": { "name": "Windows 11 Version 23H2 for x64-based Systems \u003c10.0.22631.5189", "product_id": "2" } }, { "category": "product_version", "name": "10.0.22631.5189", "product": { "name": "Windows 11 Version 23H2 for x64-based Systems 10.0.22631.5189", "product_id": "12243" } } ], "category": "product_name", "name": "Windows 11 Version 23H2 for x64-based Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.25398.1551", "product": { "name": "Windows Server 2022, 23H2 Edition (Server Core installation) \u003c10.0.25398.1551", "product_id": "1" } }, { "category": "product_version", "name": "10.0.25398.1551", "product": { "name": "Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.1551", "product_id": "12244" } } ], "category": "product_name", "name": "Windows Server 2022, 23H2 Edition (Server Core installation)" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-26635", "cwe": { "id": "CWE-1390", "name": "Weak Authentication" }, "notes": [ { "category": "general", "text": "Microsoft", "title": "Assigning CNA" }, { "category": "faq", "text": "An attacker who successfully exploited this vulnerability could bypass the Windows Hello security feature.\nPlease see Windows Hello | Microsoft Learn for more details.", "title": "What kind of security feature could be bypassed by successfully exploiting this vulnerability?" } ], "product_status": { "fixed": [ "11568", "11569", "11571", "11572", "11923", "11924", "11929", "11930", "11931", "12085", "12086", "12097", "12098", "12099", "12242", "12243", "12244" ], "known_affected": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635" }, { "category": "self", "summary": "CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-26635.json" } ], "remediations": [ { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.17763.7136:Security Update:https://support.microsoft.com/help/5055519", "product_ids": [ "17", "16", "15", "14" ], "url": "https://support.microsoft.com/help/5055519" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.20348.3453:Security Update:https://support.microsoft.com/help/5055526", "product_ids": [ "13", "12" ], "url": "https://support.microsoft.com/help/5055526" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.19044.5737:Security Update:https://support.microsoft.com/help/5055518", "product_ids": [ "11", "10", "9" ], "url": "https://support.microsoft.com/help/5055518" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.22621.5189:Security Update:https://support.microsoft.com/help/5055528", "product_ids": [ "8", "7" ], "url": "https://support.microsoft.com/help/5055528" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.19045.5737:Security Update:https://support.microsoft.com/help/5055518", "product_ids": [ "6", "5", "4" ], "url": "https://support.microsoft.com/help/5055518" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.22631.5189:Security Update:https://support.microsoft.com/help/5055528", "product_ids": [ "3", "2" ], "url": "https://support.microsoft.com/help/5055528" }, { "category": "vendor_fix", "date": "2025-04-08T07:00:00.000Z", "details": "10.0.25398.1551:Security Update:https://support.microsoft.com/help/5055527", "product_ids": [ "1" ], "url": "https://support.microsoft.com/help/5055527" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalsScore": 0.0, "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.7, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17" ] } ], "threats": [ { "category": "impact", "details": "Security Feature Bypass" }, { "category": "exploit_status", "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely" } ], "title": "Windows Hello Security Feature Bypass Vulnerability" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.