Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-48958 (GCVE-0-2024-48958)
Vulnerability from cvelistv5 – Published: 2024-10-10 00:00 – Updated: 2025-11-03 20:41
VLAI?
EPSS
Summary
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
Severity ?
7.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "libarchive",
"vendor": "libarchive",
"versions": [
{
"lessThan": "3.7.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-48958",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T20:35:05.629427Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T20:35:53.287Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:41:07.588Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/13"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/8"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/4"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/12"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-29T19:22:54.655Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5"
},
{
"url": "https://github.com/libarchive/libarchive/pull/2148"
},
{
"url": "https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-48958",
"datePublished": "2024-10-10T00:00:00.000Z",
"dateReserved": "2024-10-10T00:00:00.000Z",
"dateUpdated": "2025-11-03T20:41:07.588Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-48958\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-10-10T02:15:03.057\",\"lastModified\":\"2025-11-03T21:16:31.263\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.\"},{\"lang\":\"es\",\"value\":\"execute_filter_delta en archive_read_support_format_rar.c en libarchive anterior a 3.7.5 permite acceso fuera de los l\u00edmites a trav\u00e9s de un archivo de almacenamiento manipulado espec\u00edficamente porque src puede moverse m\u00e1s all\u00e1 de dst.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.7.5\",\"matchCriteriaId\":\"D4C0BF28-3BBD-42CA-9452-6D6D31F73D35\"}]}]}],\"references\":[{\"url\":\"https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/libarchive/libarchive/pull/2148\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2025/Apr/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Apr/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Apr/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Apr/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Apr/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-48958\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-10T20:35:05.629427Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*\"], \"vendor\": \"libarchive\", \"product\": \"libarchive\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.7.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-10T20:35:30.230Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5\"}, {\"url\": \"https://github.com/libarchive/libarchive/pull/2148\"}, {\"url\": \"https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-08-29T19:22:54.655Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-48958\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-29T19:22:54.655Z\", \"dateReserved\": \"2024-10-10T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-10-10T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
MSRC_CVE-2024-48958
Vulnerability from csaf_microsoft - Published: 2024-10-01 07:00 - Updated: 2026-02-18 14:05Summary
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
7.8 (High)
Vendor Fix
3.6.1-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
Vendor Fix
3.7.7-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
References
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-48958 execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-48958.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"tracking": {
"current_release_date": "2026-02-18T14:05:32.000Z",
"generator": {
"date": "2026-02-21T03:32:17.648Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-48958",
"initial_release_date": "2024-10-01T07:00:00.000Z",
"revision_history": [
{
"date": "2024-10-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-10-30T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added libarchive to Azure Linux 3.0\nAdded libarchive to CBL-Mariner 2.0"
},
{
"date": "2026-02-18T14:05:32.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 libarchive 3.6.1-4",
"product": {
"name": "\u003ccbl2 libarchive 3.6.1-4",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 libarchive 3.6.1-4",
"product": {
"name": "cbl2 libarchive 3.6.1-4",
"product_id": "17222"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libarchive 3.7.7-1",
"product": {
"name": "\u003cazl3 libarchive 3.7.7-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 libarchive 3.7.7-1",
"product": {
"name": "azl3 libarchive 3.7.7-1",
"product_id": "17609"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libarchive 3.7.1-2",
"product": {
"name": "\u003cazl3 libarchive 3.7.1-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 libarchive 3.7.1-2",
"product": {
"name": "azl3 libarchive 3.7.1-2",
"product_id": "17723"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libarchive 3.6.1-6",
"product": {
"name": "\u003ccbl2 libarchive 3.6.1-6",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libarchive 3.6.1-6",
"product": {
"name": "cbl2 libarchive 3.6.1-6",
"product_id": "19704"
}
}
],
"category": "product_name",
"name": "libarchive"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libarchive 3.6.1-4 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libarchive 3.6.1-4 as a component of CBL Mariner 2.0",
"product_id": "17222-17086"
},
"product_reference": "17222",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libarchive 3.7.7-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libarchive 3.7.7-1 as a component of Azure Linux 3.0",
"product_id": "17609-17084"
},
"product_reference": "17609",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libarchive 3.7.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libarchive 3.7.1-2 as a component of Azure Linux 3.0",
"product_id": "17723-17084"
},
"product_reference": "17723",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libarchive 3.6.1-6 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libarchive 3.6.1-6 as a component of CBL Mariner 2.0",
"product_id": "19704-17086"
},
"product_reference": "19704",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-48958",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17222-17086",
"17609-17084",
"17723-17084",
"19704-17086"
],
"known_affected": [
"17086-4",
"17084-3",
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-48958 execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-48958.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-18T00:00:00.000Z",
"details": "3.6.1-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-10-18T00:00:00.000Z",
"details": "3.7.7-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-4",
"17084-3",
"17084-2",
"17086-1"
]
}
],
"title": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst."
}
]
}
SUSE-SU-2025:20257-1
Vulnerability from csaf_suse - Published: 2025-03-31 14:21 - Updated: 2025-03-31 14:21Summary
Security update for libarchive
Severity
Important
Notes
Title of the patch: Security update for libarchive
Description of the patch: This update for libarchive fixes the following issues:
- CVE-2025-1632: Fixed null pointer dereference in bsdunzip.c (bsc#1237606)
- CVE-2025-25724: Fixed Buffer Overflow vulnerability in libarchive (bsc#1238610)
- CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624)
- CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (also attributed CVE-2024-26256) (CVE-2024-26256, bsc#1225972)
- CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544)
- CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971)
Patchnames: SUSE-SLE-Micro-6.1-50
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libarchive",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libarchive fixes the following issues:\n\n- CVE-2025-1632: Fixed null pointer dereference in bsdunzip.c (bsc#1237606)\n- CVE-2025-25724: Fixed Buffer Overflow vulnerability in libarchive (bsc#1238610)\n- CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624)\n- CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (also attributed CVE-2024-26256) (CVE-2024-26256, bsc#1225972)\n- CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544)\n- CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-50",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20257-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20257-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520257-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20257-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html"
},
{
"category": "self",
"summary": "SUSE Bug 1225971",
"url": "https://bugzilla.suse.com/1225971"
},
{
"category": "self",
"summary": "SUSE Bug 1225972",
"url": "https://bugzilla.suse.com/1225972"
},
{
"category": "self",
"summary": "SUSE Bug 1231544",
"url": "https://bugzilla.suse.com/1231544"
},
{
"category": "self",
"summary": "SUSE Bug 1231624",
"url": "https://bugzilla.suse.com/1231624"
},
{
"category": "self",
"summary": "SUSE Bug 1237606",
"url": "https://bugzilla.suse.com/1237606"
},
{
"category": "self",
"summary": "SUSE Bug 1238610",
"url": "https://bugzilla.suse.com/1238610"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-20696 page",
"url": "https://www.suse.com/security/cve/CVE-2024-20696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-20697 page",
"url": "https://www.suse.com/security/cve/CVE-2024-20697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26256 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48957 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1632 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-25724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-25724/"
}
],
"title": "Security update for libarchive",
"tracking": {
"current_release_date": "2025-03-31T14:21:24Z",
"generator": {
"date": "2025-03-31T14:21:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20257-1",
"initial_release_date": "2025-03-31T14:21:24Z",
"revision_history": [
{
"date": "2025-03-31T14:21:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"product": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"product_id": "libarchive13-3.7.4-slfo.1.1_2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"product": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"product_id": "libarchive13-3.7.4-slfo.1.1_2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"product": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"product_id": "libarchive13-3.7.4-slfo.1.1_2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.7.4-slfo.1.1_2.1.x86_64",
"product": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.x86_64",
"product_id": "libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64"
},
"product_reference": "libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le"
},
"product_reference": "libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x"
},
"product_reference": "libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.4-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
},
"product_reference": "libarchive13-3.7.4-slfo.1.1_2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-20696"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-20696",
"url": "https://www.suse.com/security/cve/CVE-2024-20696"
},
{
"category": "external",
"summary": "SUSE Bug 1225971 for CVE-2024-20696",
"url": "https://bugzilla.suse.com/1225971"
},
{
"category": "external",
"summary": "SUSE Bug 1225972 for CVE-2024-20696",
"url": "https://bugzilla.suse.com/1225972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "important"
}
],
"title": "CVE-2024-20696"
},
{
"cve": "CVE-2024-20697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-20697"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-20697",
"url": "https://www.suse.com/security/cve/CVE-2024-20697"
},
{
"category": "external",
"summary": "SUSE Bug 1225972 for CVE-2024-20697",
"url": "https://bugzilla.suse.com/1225972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "important"
}
],
"title": "CVE-2024-20697"
},
{
"cve": "CVE-2024-26256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26256"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26256",
"url": "https://www.suse.com/security/cve/CVE-2024-26256"
},
{
"category": "external",
"summary": "SUSE Bug 1222911 for CVE-2024-26256",
"url": "https://bugzilla.suse.com/1222911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "important"
}
],
"title": "CVE-2024-26256"
},
{
"cve": "CVE-2024-48957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48957"
}
],
"notes": [
{
"category": "general",
"text": "execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48957",
"url": "https://www.suse.com/security/cve/CVE-2024-48957"
},
{
"category": "external",
"summary": "SUSE Bug 1231543 for CVE-2024-48957",
"url": "https://bugzilla.suse.com/1231543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "important"
}
],
"title": "CVE-2024-48957"
},
{
"cve": "CVE-2024-48958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48958"
}
],
"notes": [
{
"category": "general",
"text": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48958",
"url": "https://www.suse.com/security/cve/CVE-2024-48958"
},
{
"category": "external",
"summary": "SUSE Bug 1231622 for CVE-2024-48958",
"url": "https://bugzilla.suse.com/1231622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "important"
}
],
"title": "CVE-2024-48958"
},
{
"cve": "CVE-2025-1632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1632"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1632",
"url": "https://www.suse.com/security/cve/CVE-2025-1632"
},
{
"category": "external",
"summary": "SUSE Bug 1237606 for CVE-2025-1632",
"url": "https://bugzilla.suse.com/1237606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-1632"
},
{
"cve": "CVE-2025-25724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-25724"
}
],
"notes": [
{
"category": "general",
"text": "list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-25724",
"url": "https://www.suse.com/security/cve/CVE-2025-25724"
},
{
"category": "external",
"summary": "SUSE Bug 1238610 for CVE-2025-25724",
"url": "https://bugzilla.suse.com/1238610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libarchive13-3.7.4-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-31T14:21:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-25724"
}
]
}
SUSE-SU-2024:3940-1
Vulnerability from csaf_suse - Published: 2024-11-07 10:09 - Updated: 2024-11-07 10:09Summary
Security update for libarchive
Severity
Important
Notes
Title of the patch: Security update for libarchive
Description of the patch: This update for libarchive fixes the following issues:
- CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (bsc#1225972).
- CVE-2024-48958: Fixed out-of-bounds access via a crafted archive file in execute_filter_delta function (bsc#1231624).
Patchnames: SUSE-2024-3940,SUSE-SLE-Module-Basesystem-15-SP6-2024-3940,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3940,openSUSE-SLE-15.6-2024-3940
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libarchive",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libarchive fixes the following issues:\n\n- CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (bsc#1225972).\n- CVE-2024-48958: Fixed out-of-bounds access via a crafted archive file in execute_filter_delta function (bsc#1231624).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3940,SUSE-SLE-Module-Basesystem-15-SP6-2024-3940,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3940,openSUSE-SLE-15.6-2024-3940",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3940-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3940-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243940-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3940-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019789.html"
},
{
"category": "self",
"summary": "SUSE Bug 1225972",
"url": "https://bugzilla.suse.com/1225972"
},
{
"category": "self",
"summary": "SUSE Bug 1231624",
"url": "https://bugzilla.suse.com/1231624"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-20697 page",
"url": "https://www.suse.com/security/cve/CVE-2024-20697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48958/"
}
],
"title": "Security update for libarchive",
"tracking": {
"current_release_date": "2024-11-07T10:09:07Z",
"generator": {
"date": "2024-11-07T10:09:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3940-1",
"initial_release_date": "2024-11-07T10:09:07Z",
"revision_history": [
{
"date": "2024-11-07T10:09:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bsdtar-3.7.2-150600.3.9.1.aarch64",
"product": {
"name": "bsdtar-3.7.2-150600.3.9.1.aarch64",
"product_id": "bsdtar-3.7.2-150600.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"product": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"product_id": "libarchive-devel-3.7.2-150600.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libarchive13-3.7.2-150600.3.9.1.aarch64",
"product": {
"name": "libarchive13-3.7.2-150600.3.9.1.aarch64",
"product_id": "libarchive13-3.7.2-150600.3.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-64bit-3.7.2-150600.3.9.1.aarch64_ilp32",
"product": {
"name": "libarchive13-64bit-3.7.2-150600.3.9.1.aarch64_ilp32",
"product_id": "libarchive13-64bit-3.7.2-150600.3.9.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "bsdtar-3.7.2-150600.3.9.1.i586",
"product": {
"name": "bsdtar-3.7.2-150600.3.9.1.i586",
"product_id": "bsdtar-3.7.2-150600.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "libarchive-devel-3.7.2-150600.3.9.1.i586",
"product": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.i586",
"product_id": "libarchive-devel-3.7.2-150600.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "libarchive13-3.7.2-150600.3.9.1.i586",
"product": {
"name": "libarchive13-3.7.2-150600.3.9.1.i586",
"product_id": "libarchive13-3.7.2-150600.3.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "bsdtar-3.7.2-150600.3.9.1.ppc64le",
"product": {
"name": "bsdtar-3.7.2-150600.3.9.1.ppc64le",
"product_id": "bsdtar-3.7.2-150600.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"product": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"product_id": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libarchive13-3.7.2-150600.3.9.1.ppc64le",
"product": {
"name": "libarchive13-3.7.2-150600.3.9.1.ppc64le",
"product_id": "libarchive13-3.7.2-150600.3.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bsdtar-3.7.2-150600.3.9.1.s390x",
"product": {
"name": "bsdtar-3.7.2-150600.3.9.1.s390x",
"product_id": "bsdtar-3.7.2-150600.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libarchive-devel-3.7.2-150600.3.9.1.s390x",
"product": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.s390x",
"product_id": "libarchive-devel-3.7.2-150600.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libarchive13-3.7.2-150600.3.9.1.s390x",
"product": {
"name": "libarchive13-3.7.2-150600.3.9.1.s390x",
"product_id": "libarchive13-3.7.2-150600.3.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bsdtar-3.7.2-150600.3.9.1.x86_64",
"product": {
"name": "bsdtar-3.7.2-150600.3.9.1.x86_64",
"product_id": "bsdtar-3.7.2-150600.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"product": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"product_id": "libarchive-devel-3.7.2-150600.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libarchive13-3.7.2-150600.3.9.1.x86_64",
"product": {
"name": "libarchive13-3.7.2-150600.3.9.1.x86_64",
"product_id": "libarchive13-3.7.2-150600.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libarchive13-32bit-3.7.2-150600.3.9.1.x86_64",
"product": {
"name": "libarchive13-32bit-3.7.2-150600.3.9.1.x86_64",
"product_id": "libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsdtar-3.7.2-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "bsdtar-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive-devel-3.7.2-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.7.2-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "libarchive13-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-32bit-3.7.2-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
},
"product_reference": "libarchive13-32bit-3.7.2-150600.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-20697"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-20697",
"url": "https://www.suse.com/security/cve/CVE-2024-20697"
},
{
"category": "external",
"summary": "SUSE Bug 1225972 for CVE-2024-20697",
"url": "https://bugzilla.suse.com/1225972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-07T10:09:07Z",
"details": "important"
}
],
"title": "CVE-2024-20697"
},
{
"cve": "CVE-2024-48958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48958"
}
],
"notes": [
{
"category": "general",
"text": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48958",
"url": "https://www.suse.com/security/cve/CVE-2024-48958"
},
{
"category": "external",
"summary": "SUSE Bug 1231622 for CVE-2024-48958",
"url": "https://bugzilla.suse.com/1231622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:bsdtar-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive-devel-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.aarch64",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.ppc64le",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.s390x",
"openSUSE Leap 15.6:libarchive13-3.7.2-150600.3.9.1.x86_64",
"openSUSE Leap 15.6:libarchive13-32bit-3.7.2-150600.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-07T10:09:07Z",
"details": "important"
}
],
"title": "CVE-2024-48958"
}
]
}
SUSE-SU-2025:20087-1
Vulnerability from csaf_suse - Published: 2025-02-03 09:09 - Updated: 2025-02-03 09:09Summary
Security update for libarchive
Severity
Important
Notes
Title of the patch: Security update for libarchive
Description of the patch: This update for libarchive fixes the following issues:
- CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624).
- CVE-2024-20697: Fixed out-of-bounds remote code execution vulnerability (bsc#1225972).
- CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544).
Patchnames: SUSE-SLE-Micro-6.0-121
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libarchive",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libarchive fixes the following issues:\n\n- CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624).\n- CVE-2024-20697: Fixed out-of-bounds remote code execution vulnerability (bsc#1225972).\n- CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-121",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20087-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20087-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520087-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20087-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021229.html"
},
{
"category": "self",
"summary": "SUSE Bug 1225972",
"url": "https://bugzilla.suse.com/1225972"
},
{
"category": "self",
"summary": "SUSE Bug 1231544",
"url": "https://bugzilla.suse.com/1231544"
},
{
"category": "self",
"summary": "SUSE Bug 1231624",
"url": "https://bugzilla.suse.com/1231624"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-20697 page",
"url": "https://www.suse.com/security/cve/CVE-2024-20697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26256 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48957 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48958/"
}
],
"title": "Security update for libarchive",
"tracking": {
"current_release_date": "2025-02-03T09:09:12Z",
"generator": {
"date": "2025-02-03T09:09:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20087-1",
"initial_release_date": "2025-02-03T09:09:12Z",
"revision_history": [
{
"date": "2025-02-03T09:09:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.6.2-4.1.aarch64",
"product": {
"name": "libarchive13-3.6.2-4.1.aarch64",
"product_id": "libarchive13-3.6.2-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.6.2-4.1.s390x",
"product": {
"name": "libarchive13-3.6.2-4.1.s390x",
"product_id": "libarchive13-3.6.2-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libarchive13-3.6.2-4.1.x86_64",
"product": {
"name": "libarchive13-3.6.2-4.1.x86_64",
"product_id": "libarchive13-3.6.2-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.6.2-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64"
},
"product_reference": "libarchive13-3.6.2-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.6.2-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x"
},
"product_reference": "libarchive13-3.6.2-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libarchive13-3.6.2-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
},
"product_reference": "libarchive13-3.6.2-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-20697"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-20697",
"url": "https://www.suse.com/security/cve/CVE-2024-20697"
},
{
"category": "external",
"summary": "SUSE Bug 1225972 for CVE-2024-20697",
"url": "https://bugzilla.suse.com/1225972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:09:12Z",
"details": "important"
}
],
"title": "CVE-2024-20697"
},
{
"cve": "CVE-2024-26256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26256"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26256",
"url": "https://www.suse.com/security/cve/CVE-2024-26256"
},
{
"category": "external",
"summary": "SUSE Bug 1222911 for CVE-2024-26256",
"url": "https://bugzilla.suse.com/1222911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:09:12Z",
"details": "important"
}
],
"title": "CVE-2024-26256"
},
{
"cve": "CVE-2024-48957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48957"
}
],
"notes": [
{
"category": "general",
"text": "execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48957",
"url": "https://www.suse.com/security/cve/CVE-2024-48957"
},
{
"category": "external",
"summary": "SUSE Bug 1231543 for CVE-2024-48957",
"url": "https://bugzilla.suse.com/1231543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:09:12Z",
"details": "important"
}
],
"title": "CVE-2024-48957"
},
{
"cve": "CVE-2024-48958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48958"
}
],
"notes": [
{
"category": "general",
"text": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48958",
"url": "https://www.suse.com/security/cve/CVE-2024-48958"
},
{
"category": "external",
"summary": "SUSE Bug 1231622 for CVE-2024-48958",
"url": "https://bugzilla.suse.com/1231622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.aarch64",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.s390x",
"SUSE Linux Micro 6.0:libarchive13-3.6.2-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:09:12Z",
"details": "important"
}
],
"title": "CVE-2024-48958"
}
]
}
GHSA-9MW4-2PPR-4MCG
Vulnerability from github – Published: 2024-10-10 03:30 – Updated: 2025-11-03 21:31
VLAI?
Details
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2024-48958"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-10T02:15:03Z",
"severity": "HIGH"
},
"details": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.",
"id": "GHSA-9mw4-2ppr-4mcg",
"modified": "2025-11-03T21:31:16Z",
"published": "2024-10-10T03:30:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48958"
},
{
"type": "WEB",
"url": "https://github.com/libarchive/libarchive/pull/2148"
},
{
"type": "WEB",
"url": "https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5"
},
{
"type": "WEB",
"url": "https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Apr/11"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Apr/12"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Apr/13"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Apr/4"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Apr/8"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
BDU:2024-09441
Vulnerability from fstec - Published: 27.04.2024
VLAI Severity ?
Title
Уязвимость функции execute_filter_delta компонента archive_read_support_format_rar.c библиотеки архивирования Libarchive, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Description
Уязвимость функции execute_filter_delta компонента archive_read_support_format_rar.c библиотеки архивирования Libarchive связана с чтением за допустимыми границами буфера данных. Эксплуатация уязвимости может позволить нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании с помощью специально созданного файла архива
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «Ред Софт», ООО «РусБИТех-Астра», АО «ИВК», АО «НТЦ ИТ РОСА»
Software Name
Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Astra Linux Special Edition (запись в едином реестре российских программ №369), Альт 8 СП (запись в едином реестре российских программ №4305), Astra Linux Common Edition (запись в едином реестре российских программ №4433), РОСА ХРОМ (запись в едином реестре российских программ №1607), libarchive
Software Version
12 (Debian GNU/Linux), 7.3 (РЕД ОС), 4.7 (Astra Linux Special Edition), - (Альт 8 СП), 1.6 «Смоленск» (Astra Linux Common Edition), 12.4 (РОСА ХРОМ), до 3.7.5 (libarchive)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Libarchive:
использование рекомендаций производителя: https://github.com/libarchive/libarchive/commit/a1cb648d52f5b6d3f31184d9b6a7cbca628459b7
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2024-48958
Для ОС Astra Linux:
обновить пакет libarchive до 3.7.4-0astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47
Для операционной системы РОСА ХРОМ: https://abf.rosa.ru/advisories/ROSA-SA-2025-2583
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для ОС Astra Linux:
обновить пакет libarchive до 3.7.4-0astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16
Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства: https://altsp.su/obnovleniya-bezopasnosti/
Reference
https://github.com/libarchive/libarchive/commit/a1cb648d52f5b6d3f31184d9b6a7cbca628459b7
https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5
https://github.com/libarchive/libarchive/pull/2148
https://nvd.nist.gov/vuln/detail/CVE-2024-48958
https://security-tracker.debian.org/tracker/CVE-2024-48958
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47
https://abf.rosa.ru/advisories/ROSA-SA-2025-2583
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16
https://altsp.su/obnovleniya-bezopasnosti/
CWE
CWE-125
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 4.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Common Edition), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), \u0434\u043e 3.7.5 (libarchive)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Libarchive:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://github.com/libarchive/libarchive/commit/a1cb648d52f5b6d3f31184d9b6a7cbca628459b7\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2024-48958\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libarchive \u0434\u043e 3.7.4-0astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosa.ru/advisories/ROSA-SA-2025-2583\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libarchive \u0434\u043e 3.7.4-0astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.11.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-09441",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-48958",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), libarchive",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 execute_filter_delta \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 archive_read_support_format_rar.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0430\u0440\u0445\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Libarchive, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 execute_filter_delta \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 archive_read_support_format_rar.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0430\u0440\u0445\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Libarchive \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0430\u0440\u0445\u0438\u0432\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/libarchive/libarchive/commit/a1cb648d52f5b6d3f31184d9b6a7cbca628459b7\nhttps://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5\nhttps://github.com/libarchive/libarchive/pull/2148\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-48958\nhttps://security-tracker.debian.org/tracker/CVE-2024-48958\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2583\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
WID-SEC-W-2025-0663
Vulnerability from csaf_certbund - Published: 2025-03-31 22:00 - Updated: 2025-06-11 22:00Summary
Apple iOS und iPadOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um vertrauliche Informationen preiszugeben, beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, erhöhte Rechte zu erlangen oder Daten zu manipulieren.
Betroffene Betriebssysteme: - MacOS X
References
| URL | Category | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um vertrauliche Informationen preiszugeben, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, erh\u00f6hte Rechte zu erlangen oder Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0663 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0663.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0663 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0663"
},
{
"category": "external",
"summary": "About the security content of iOS 18.4 and iPadOS 18.4 vom 2025-03-31",
"url": "https://support.apple.com/en-us/122371"
},
{
"category": "external",
"summary": "About the security content of iPadOS 17.7.6 vom 2025-03-31",
"url": "https://support.apple.com/en-us/122372"
},
{
"category": "external",
"summary": "KEV Catalog CVE-2025-24085 vom 2025-01-29",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-24085\u0026field_date_added_wrapper=all\u0026field_cve=\u0026sort_by=field_date_added\u0026items_per_page=20\u0026url"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20257-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-11T22:00:00.000+00:00",
"generator": {
"date": "2025-06-12T05:14:23.708+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0663",
"initial_release_date": "2025-03-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-05-04T22:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.4",
"product": {
"name": "Apple iOS \u003c18.4",
"product_id": "T042234"
}
},
{
"category": "product_version",
"name": "18.4",
"product": {
"name": "Apple iOS 18.4",
"product_id": "T042234-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:18.4"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.4",
"product": {
"name": "Apple iPadOS \u003c18.4",
"product_id": "T042235"
}
},
{
"category": "product_version",
"name": "18.4",
"product": {
"name": "Apple iPadOS 18.4",
"product_id": "T042235-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:18.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17.7.6",
"product": {
"name": "Apple iPadOS \u003c17.7.6",
"product_id": "T042236"
}
},
{
"category": "product_version",
"name": "17.7.6",
"product": {
"name": "Apple iPadOS 17.7.6",
"product_id": "T042236-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:17.7.6"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-48958",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-48958"
},
{
"cve": "CVE-2024-54502",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-54502"
},
{
"cve": "CVE-2024-54508",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-54508"
},
{
"cve": "CVE-2024-54534",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-54534"
},
{
"cve": "CVE-2024-54543",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-54543"
},
{
"cve": "CVE-2024-56171",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2024-9681",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-9681"
},
{
"cve": "CVE-2025-24085",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24085"
},
{
"cve": "CVE-2025-24095",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24095"
},
{
"cve": "CVE-2025-24097",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24097"
},
{
"cve": "CVE-2025-24113",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24113"
},
{
"cve": "CVE-2025-24163",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24163"
},
{
"cve": "CVE-2025-24167",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24167"
},
{
"cve": "CVE-2025-24173",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24173"
},
{
"cve": "CVE-2025-24178",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24178"
},
{
"cve": "CVE-2025-24180",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24180"
},
{
"cve": "CVE-2025-24182",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24182"
},
{
"cve": "CVE-2025-24190",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24190"
},
{
"cve": "CVE-2025-24192",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24192"
},
{
"cve": "CVE-2025-24193",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24193"
},
{
"cve": "CVE-2025-24194",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24194"
},
{
"cve": "CVE-2025-24198",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24198"
},
{
"cve": "CVE-2025-24202",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24202"
},
{
"cve": "CVE-2025-24203",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24203"
},
{
"cve": "CVE-2025-24205",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24205"
},
{
"cve": "CVE-2025-24206",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24206"
},
{
"cve": "CVE-2025-24208",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24208"
},
{
"cve": "CVE-2025-24209",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24209"
},
{
"cve": "CVE-2025-24210",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24210"
},
{
"cve": "CVE-2025-24211",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24211"
},
{
"cve": "CVE-2025-24212",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24212"
},
{
"cve": "CVE-2025-24213",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24213"
},
{
"cve": "CVE-2025-24214",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24214"
},
{
"cve": "CVE-2025-24215",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24215"
},
{
"cve": "CVE-2025-24216",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24216"
},
{
"cve": "CVE-2025-24217",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24217"
},
{
"cve": "CVE-2025-24221",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24221"
},
{
"cve": "CVE-2025-24230",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24230"
},
{
"cve": "CVE-2025-24237",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24237"
},
{
"cve": "CVE-2025-24238",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24238"
},
{
"cve": "CVE-2025-24243",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24243"
},
{
"cve": "CVE-2025-24244",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24244"
},
{
"cve": "CVE-2025-24251",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24251"
},
{
"cve": "CVE-2025-24252",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24252"
},
{
"cve": "CVE-2025-24257",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24257"
},
{
"cve": "CVE-2025-24264",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24264"
},
{
"cve": "CVE-2025-24270",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24270"
},
{
"cve": "CVE-2025-24271",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24271"
},
{
"cve": "CVE-2025-24283",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24283"
},
{
"cve": "CVE-2025-27113",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2025-30425",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30425"
},
{
"cve": "CVE-2025-30426",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30426"
},
{
"cve": "CVE-2025-30427",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30427"
},
{
"cve": "CVE-2025-30428",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30428"
},
{
"cve": "CVE-2025-30429",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30429"
},
{
"cve": "CVE-2025-30430",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30430"
},
{
"cve": "CVE-2025-30432",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30432"
},
{
"cve": "CVE-2025-30433",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30433"
},
{
"cve": "CVE-2025-30434",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30434"
},
{
"cve": "CVE-2025-30436",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30436"
},
{
"cve": "CVE-2025-30438",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30438"
},
{
"cve": "CVE-2025-30439",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30439"
},
{
"cve": "CVE-2025-30445",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30445"
},
{
"cve": "CVE-2025-30447",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30447"
},
{
"cve": "CVE-2025-30454",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30454"
},
{
"cve": "CVE-2025-30456",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30456"
},
{
"cve": "CVE-2025-30463",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30463"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-30466",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30466"
},
{
"cve": "CVE-2025-30467",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30467"
},
{
"cve": "CVE-2025-30469",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30469"
},
{
"cve": "CVE-2025-30470",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30470"
},
{
"cve": "CVE-2025-30471",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30471"
},
{
"cve": "CVE-2025-31182",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31182"
},
{
"cve": "CVE-2025-31183",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31183"
},
{
"cve": "CVE-2025-31184",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31184"
},
{
"cve": "CVE-2025-31191",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31191"
},
{
"cve": "CVE-2025-31192",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31192"
},
{
"cve": "CVE-2025-31197",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31197"
},
{
"cve": "CVE-2025-31199",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31199"
},
{
"cve": "CVE-2025-31202",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31202"
},
{
"cve": "CVE-2025-31203",
"product_status": {
"known_affected": [
"T042234",
"T042235",
"T042236",
"T002207"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31203"
}
]
}
WID-SEC-W-2025-0668
Vulnerability from csaf_certbund - Published: 2025-03-31 22:00 - Updated: 2025-11-12 23:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um erhöhte Rechte - sogar Root-Rechte - zu erlangen, um vertrauliche Informationen offenzulegen, um beliebigen Code auszuführen, um Daten zu manipulieren, um Sicherheitsmaßnahmen - sogar Sandbox-Einschränkungen - zu umgehen oder um einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme: - MacOS X
References
| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um erh\u00f6hte Rechte - sogar Root-Rechte - zu erlangen, um vertrauliche Informationen offenzulegen, um beliebigen Code auszuf\u00fchren, um Daten zu manipulieren, um Sicherheitsma\u00dfnahmen - sogar Sandbox-Einschr\u00e4nkungen - zu umgehen oder um einen Denial-of-Service-Zustand auszul\u00f6sen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0668 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0668.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0668 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0668"
},
{
"category": "external",
"summary": "About the security content of macOS Ventura 13.7.5 vom 2025-03-31",
"url": "https://support.apple.com/en-us/122375"
},
{
"category": "external",
"summary": "About the security content of macOS Sonoma 14.7.5 vom 2025-03-31",
"url": "https://support.apple.com/en-us/122374"
},
{
"category": "external",
"summary": "About the security content of macOS Sequoia 15.4 vom 2025-03-31",
"url": "https://support.apple.com/en-us/122373"
},
{
"category": "external",
"summary": "KEV Catalog CVE-2025-24085 vom 2025-01-29",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-24085\u0026field_date_added_wrapper=all\u0026field_cve=\u0026sort_by=field_date_added\u0026items_per_page=20\u0026url"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20257-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-12T23:00:00.000+00:00",
"generator": {
"date": "2025-11-13T10:22:27.122+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0668",
"initial_release_date": "2025-03-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-2025-43205 erg\u00e4nzt"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "6",
"summary": "Referenz(en) aufgenommen: EUVD-2025-106791"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Ventura \u003c13.7.5",
"product": {
"name": "Apple macOS Ventura \u003c13.7.5",
"product_id": "T042238"
}
},
{
"category": "product_version",
"name": "Ventura 13.7.5",
"product": {
"name": "Apple macOS Ventura 13.7.5",
"product_id": "T042238-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.7.5"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.7.5",
"product": {
"name": "Apple macOS Sonoma \u003c14.7.5",
"product_id": "T042239"
}
},
{
"category": "product_version",
"name": "Sonoma 14.7.5",
"product": {
"name": "Apple macOS Sonoma 14.7.5",
"product_id": "T042239-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.7.5"
}
}
},
{
"category": "product_version_range",
"name": "Sequoia \u003c15.4",
"product": {
"name": "Apple macOS Sequoia \u003c15.4",
"product_id": "T042240"
}
},
{
"category": "product_version",
"name": "Sequoia 15.4",
"product": {
"name": "Apple macOS Sequoia 15.4",
"product_id": "T042240-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.4"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2024-40864",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-40864"
},
{
"cve": "CVE-2024-48958",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-48958"
},
{
"cve": "CVE-2024-54533",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-54533"
},
{
"cve": "CVE-2024-56171",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2024-9681",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2024-9681"
},
{
"cve": "CVE-2025-24085",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24085"
},
{
"cve": "CVE-2025-24093",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24093"
},
{
"cve": "CVE-2025-24097",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24097"
},
{
"cve": "CVE-2025-24113",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24113"
},
{
"cve": "CVE-2025-24139",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24139"
},
{
"cve": "CVE-2025-24148",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24148"
},
{
"cve": "CVE-2025-24157",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24157"
},
{
"cve": "CVE-2025-24163",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24163"
},
{
"cve": "CVE-2025-24164",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24164"
},
{
"cve": "CVE-2025-24167",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24167"
},
{
"cve": "CVE-2025-24170",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24170"
},
{
"cve": "CVE-2025-24172",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24172"
},
{
"cve": "CVE-2025-24173",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24173"
},
{
"cve": "CVE-2025-24178",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24178"
},
{
"cve": "CVE-2025-24180",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24180"
},
{
"cve": "CVE-2025-24181",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24181"
},
{
"cve": "CVE-2025-24182",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24182"
},
{
"cve": "CVE-2025-24190",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24190"
},
{
"cve": "CVE-2025-24191",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24191"
},
{
"cve": "CVE-2025-24192",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24192"
},
{
"cve": "CVE-2025-24194",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24194"
},
{
"cve": "CVE-2025-24195",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24195"
},
{
"cve": "CVE-2025-24196",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24196"
},
{
"cve": "CVE-2025-24198",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24198"
},
{
"cve": "CVE-2025-24199",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24199"
},
{
"cve": "CVE-2025-24202",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24202"
},
{
"cve": "CVE-2025-24203",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24203"
},
{
"cve": "CVE-2025-24204",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24204"
},
{
"cve": "CVE-2025-24205",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24205"
},
{
"cve": "CVE-2025-24207",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24207"
},
{
"cve": "CVE-2025-24209",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24209"
},
{
"cve": "CVE-2025-24210",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24210"
},
{
"cve": "CVE-2025-24211",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24211"
},
{
"cve": "CVE-2025-24212",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24212"
},
{
"cve": "CVE-2025-24213",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24213"
},
{
"cve": "CVE-2025-24214",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24214"
},
{
"cve": "CVE-2025-24215",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24215"
},
{
"cve": "CVE-2025-24216",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24216"
},
{
"cve": "CVE-2025-24217",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24217"
},
{
"cve": "CVE-2025-24218",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24218"
},
{
"cve": "CVE-2025-24228",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24228"
},
{
"cve": "CVE-2025-24229",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24229"
},
{
"cve": "CVE-2025-24230",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24230"
},
{
"cve": "CVE-2025-24231",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24231"
},
{
"cve": "CVE-2025-24232",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24232"
},
{
"cve": "CVE-2025-24233",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24233"
},
{
"cve": "CVE-2025-24234",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24234"
},
{
"cve": "CVE-2025-24235",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24235"
},
{
"cve": "CVE-2025-24236",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24236"
},
{
"cve": "CVE-2025-24237",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24237"
},
{
"cve": "CVE-2025-24238",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24238"
},
{
"cve": "CVE-2025-24239",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24239"
},
{
"cve": "CVE-2025-24240",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24240"
},
{
"cve": "CVE-2025-24241",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24241"
},
{
"cve": "CVE-2025-24242",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24242"
},
{
"cve": "CVE-2025-24243",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24243"
},
{
"cve": "CVE-2025-24244",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24244"
},
{
"cve": "CVE-2025-24245",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24245"
},
{
"cve": "CVE-2025-24246",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24246"
},
{
"cve": "CVE-2025-24247",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24247"
},
{
"cve": "CVE-2025-24248",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24248"
},
{
"cve": "CVE-2025-24249",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24249"
},
{
"cve": "CVE-2025-24250",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24250"
},
{
"cve": "CVE-2025-24251",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24251"
},
{
"cve": "CVE-2025-24253",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24253"
},
{
"cve": "CVE-2025-24254",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24254"
},
{
"cve": "CVE-2025-24255",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24255"
},
{
"cve": "CVE-2025-24256",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24256"
},
{
"cve": "CVE-2025-24257",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24257"
},
{
"cve": "CVE-2025-24259",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24259"
},
{
"cve": "CVE-2025-24260",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24260"
},
{
"cve": "CVE-2025-24261",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24261"
},
{
"cve": "CVE-2025-24262",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24262"
},
{
"cve": "CVE-2025-24263",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24263"
},
{
"cve": "CVE-2025-24264",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24264"
},
{
"cve": "CVE-2025-24265",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24265"
},
{
"cve": "CVE-2025-24266",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24266"
},
{
"cve": "CVE-2025-24267",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24267"
},
{
"cve": "CVE-2025-24269",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24269"
},
{
"cve": "CVE-2025-24270",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24270"
},
{
"cve": "CVE-2025-24272",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24272"
},
{
"cve": "CVE-2025-24273",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24273"
},
{
"cve": "CVE-2025-24276",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24276"
},
{
"cve": "CVE-2025-24277",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24277"
},
{
"cve": "CVE-2025-24278",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24278"
},
{
"cve": "CVE-2025-24279",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24279"
},
{
"cve": "CVE-2025-24280",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24280"
},
{
"cve": "CVE-2025-24281",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24281"
},
{
"cve": "CVE-2025-24282",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24282"
},
{
"cve": "CVE-2025-24283",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-24283"
},
{
"cve": "CVE-2025-27113",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2025-30424",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30424"
},
{
"cve": "CVE-2025-30425",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30425"
},
{
"cve": "CVE-2025-30426",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30426"
},
{
"cve": "CVE-2025-30427",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30427"
},
{
"cve": "CVE-2025-30429",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30429"
},
{
"cve": "CVE-2025-30430",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30430"
},
{
"cve": "CVE-2025-30432",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30432"
},
{
"cve": "CVE-2025-30433",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30433"
},
{
"cve": "CVE-2025-30435",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30435"
},
{
"cve": "CVE-2025-30437",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30437"
},
{
"cve": "CVE-2025-30438",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30438"
},
{
"cve": "CVE-2025-30439",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30439"
},
{
"cve": "CVE-2025-30443",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30443"
},
{
"cve": "CVE-2025-30444",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30444"
},
{
"cve": "CVE-2025-30445",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30445"
},
{
"cve": "CVE-2025-30446",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30446"
},
{
"cve": "CVE-2025-30447",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30447"
},
{
"cve": "CVE-2025-30449",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30449"
},
{
"cve": "CVE-2025-30450",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30450"
},
{
"cve": "CVE-2025-30451",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30451"
},
{
"cve": "CVE-2025-30452",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30452"
},
{
"cve": "CVE-2025-30454",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30454"
},
{
"cve": "CVE-2025-30455",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30455"
},
{
"cve": "CVE-2025-30456",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30456"
},
{
"cve": "CVE-2025-30457",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30457"
},
{
"cve": "CVE-2025-30458",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30458"
},
{
"cve": "CVE-2025-30460",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30460"
},
{
"cve": "CVE-2025-30461",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30461"
},
{
"cve": "CVE-2025-30462",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30462"
},
{
"cve": "CVE-2025-30463",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30463"
},
{
"cve": "CVE-2025-30464",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30464"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-30466",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30466"
},
{
"cve": "CVE-2025-30467",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30467"
},
{
"cve": "CVE-2025-30470",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30470"
},
{
"cve": "CVE-2025-30471",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-30471"
},
{
"cve": "CVE-2025-31182",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31182"
},
{
"cve": "CVE-2025-31183",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31183"
},
{
"cve": "CVE-2025-31184",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31184"
},
{
"cve": "CVE-2025-31187",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31187"
},
{
"cve": "CVE-2025-31188",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31188"
},
{
"cve": "CVE-2025-31189",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31189"
},
{
"cve": "CVE-2025-31191",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31191"
},
{
"cve": "CVE-2025-31192",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31192"
},
{
"cve": "CVE-2025-31194",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31194"
},
{
"cve": "CVE-2025-31195",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31195"
},
{
"cve": "CVE-2025-31197",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31197"
},
{
"cve": "CVE-2025-31198",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31198"
},
{
"cve": "CVE-2025-31199",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31199"
},
{
"cve": "CVE-2025-31202",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31202"
},
{
"cve": "CVE-2025-31203",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31203"
},
{
"cve": "CVE-2025-31231",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31231"
},
{
"cve": "CVE-2025-31261",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31261"
},
{
"cve": "CVE-2025-31263",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31263"
},
{
"cve": "CVE-2025-31264",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-31264"
},
{
"cve": "CVE-2025-43205",
"product_status": {
"known_affected": [
"T002207",
"T042238",
"T042239",
"T042240"
]
},
"release_date": "2025-03-31T22:00:00.000+00:00",
"title": "CVE-2025-43205"
}
]
}
WID-SEC-W-2024-3142
Vulnerability from csaf_certbund - Published: 2024-10-09 22:00 - Updated: 2025-09-30 22:00Summary
libarchive: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: libarchive ist eine C Bibliothek und ein Kommandozeilen-Tool zum Lesen und Bearbeiten von tar, cpio, zip, ISO und anderen Formaten.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libarchive ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
- Windows
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libarchive ist eine C Bibliothek und ein Kommandozeilen-Tool zum Lesen und Bearbeiten von tar, cpio, zip, ISO und anderen Formaten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libarchive ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3142 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3142.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3142 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3142"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2024-10-09",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48957"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2024-10-09",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48958"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2024-10-09",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317729"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2024-10-09",
"url": "https://access.redhat.com/security/cve/CVE-2024-48957"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-AB6348928B vom 2024-10-15",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-ab6348928b"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7070-1 vom 2024-10-16",
"url": "https://ubuntu.com/security/notices/USN-7070-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-80E4603B92 vom 2024-10-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-80e4603b92"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3675-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RP4NL6JY64B34TRDXT26D5RFLF7FBODV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3940-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T52X7E57LHYSHFIOUR75MGSIL4OEOTYD/"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20257-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20087-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021290.html"
},
{
"category": "external",
"summary": "Absolute Security Information vom 2025-09-30",
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1410"
}
],
"source_lang": "en-US",
"title": "libarchive: Mehrere Schwachstellen erm\u00f6glichen Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-09-30T22:00:00.000+00:00",
"generator": {
"date": "2025-10-01T06:52:07.749+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3142",
"initial_release_date": "2024-10-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora und Ubuntu aufgenommen"
},
{
"date": "2024-10-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-07T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Server \u003c14.10",
"product": {
"name": "Absolute Secure Access Server \u003c14.10",
"product_id": "T047275"
}
},
{
"category": "product_version",
"name": "Server 14.10",
"product": {
"name": "Absolute Secure Access Server 14.10",
"product_id": "T047275-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:absolute:secure_access:server__14.10"
}
}
},
{
"category": "product_version_range",
"name": "Insights \u003c4.30",
"product": {
"name": "Absolute Secure Access Insights \u003c4.30",
"product_id": "T047276"
}
},
{
"category": "product_version",
"name": "Insights 4.30",
"product": {
"name": "Absolute Secure Access Insights 4.30",
"product_id": "T047276-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:absolute:secure_access:insights__4.30"
}
}
}
],
"category": "product_name",
"name": "Secure Access"
}
],
"category": "vendor",
"name": "Absolute"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.7.5",
"product": {
"name": "Open Source libarchive \u003c3.7.5",
"product_id": "T038241"
}
},
{
"category": "product_version",
"name": "3.7.5",
"product": {
"name": "Open Source libarchive 3.7.5",
"product_id": "T038241-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:libarchive:libarchive:3.7.5"
}
}
}
],
"category": "product_name",
"name": "libarchive"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-48957",
"product_status": {
"known_affected": [
"T038241",
"T002207",
"T000126",
"T047276",
"T002977",
"T047275",
"74185"
]
},
"release_date": "2024-10-09T22:00:00.000+00:00",
"title": "CVE-2024-48957"
},
{
"cve": "CVE-2024-48958",
"product_status": {
"known_affected": [
"T038241",
"T002207",
"T000126",
"T047276",
"T002977",
"T047275",
"74185"
]
},
"release_date": "2024-10-09T22:00:00.000+00:00",
"title": "CVE-2024-48958"
}
]
}
FKIE_CVE-2024-48958
Vulnerability from fkie_nvd - Published: 2024-10-10 02:15 - Updated: 2025-11-03 21:16
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5 | Patch | |
| cve@mitre.org | https://github.com/libarchive/libarchive/pull/2148 | Patch | |
| cve@mitre.org | https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Apr/11 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Apr/12 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Apr/13 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Apr/4 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Apr/8 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| libarchive | libarchive | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C0BF28-3BBD-42CA-9452-6D6D31F73D35",
"versionEndExcluding": "3.7.5",
"versionStartIncluding": "3.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst."
},
{
"lang": "es",
"value": "execute_filter_delta en archive_read_support_format_rar.c en libarchive anterior a 3.7.5 permite acceso fuera de los l\u00edmites a trav\u00e9s de un archivo de almacenamiento manipulado espec\u00edficamente porque src puede moverse m\u00e1s all\u00e1 de dst."
}
],
"id": "CVE-2024-48958",
"lastModified": "2025-11-03T21:16:31.263",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-10T02:15:03.057",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libarchive/libarchive/pull/2148"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Apr/8"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0258
Vulnerability from certfr_avis - Published: 2025-04-01 - Updated: 2025-04-30
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Apple indique que les vulnérabilités CVE-2025-24200 et CVE-2025-24201 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iPadOS | iPadOS versions antérieures à 17.7.6 | ||
| Apple | iOS | iOS versions antérieures à 18.4 | ||
| Apple | N/A | Xcode versions antérieures à 16.3 | ||
| Apple | iOS | iOS versions antérieures à 16.7.11 | ||
| Apple | visionOS | visionOS versions antérieures à 2.4 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13.7.5 | ||
| Apple | tvOS | tvOS versions antérieures à 18.4 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.4 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.7.5 | ||
| Apple | iPadOS | iPadOS versions antérieures à 18.4 | ||
| Apple | iOS | iOS versions antérieures à 15.8.4 | ||
| Apple | iPadOS | iPadOS versions antérieures à 16.7.11 | ||
| Apple | iPadOS | iPadOS versions antérieures à 15.8.4 | ||
| Apple | Safari | Safari versions antérieures à 18.4 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.6",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 18.4",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 16.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.7.11",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 2.4",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 18.4",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 18.4",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 15.8.4",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16.7.11",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 15.8.4",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 18.4",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-24206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24206"
},
{
"name": "CVE-2024-54508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
},
{
"name": "CVE-2025-24205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24205"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-24266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24266"
},
{
"name": "CVE-2024-54502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
},
{
"name": "CVE-2025-24273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24273"
},
{
"name": "CVE-2025-30425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30425"
},
{
"name": "CVE-2025-24200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24200"
},
{
"name": "CVE-2025-24228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24228"
},
{
"name": "CVE-2025-24210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24210"
},
{
"name": "CVE-2025-24265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24265"
},
{
"name": "CVE-2025-24260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24260"
},
{
"name": "CVE-2025-24249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24249"
},
{
"name": "CVE-2025-30455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30455"
},
{
"name": "CVE-2025-30471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30471"
},
{
"name": "CVE-2025-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
},
{
"name": "CVE-2025-24253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24253"
},
{
"name": "CVE-2025-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30447"
},
{
"name": "CVE-2025-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30445"
},
{
"name": "CVE-2025-24207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24207"
},
{
"name": "CVE-2025-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24240"
},
{
"name": "CVE-2025-24229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24229"
},
{
"name": "CVE-2025-24246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24246"
},
{
"name": "CVE-2025-24182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24182"
},
{
"name": "CVE-2025-24279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24279"
},
{
"name": "CVE-2025-24271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24271"
},
{
"name": "CVE-2025-30469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30469"
},
{
"name": "CVE-2025-24178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24178"
},
{
"name": "CVE-2025-30463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30463"
},
{
"name": "CVE-2025-30457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30457"
},
{
"name": "CVE-2025-24126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24126"
},
{
"name": "CVE-2025-24204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24204"
},
{
"name": "CVE-2025-24216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-30462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30462"
},
{
"name": "CVE-2025-30467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30467"
},
{
"name": "CVE-2025-24262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24262"
},
{
"name": "CVE-2025-24270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24270"
},
{
"name": "CVE-2025-24194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24194"
},
{
"name": "CVE-2025-24267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24267"
},
{
"name": "CVE-2025-24235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24235"
},
{
"name": "CVE-2025-24193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24193"
},
{
"name": "CVE-2025-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24281"
},
{
"name": "CVE-2025-24221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24221"
},
{
"name": "CVE-2025-24257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24257"
},
{
"name": "CVE-2025-31187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31187"
},
{
"name": "CVE-2025-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30449"
},
{
"name": "CVE-2025-24263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24263"
},
{
"name": "CVE-2025-24191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24191"
},
{
"name": "CVE-2025-30464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30464"
},
{
"name": "CVE-2025-30429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30429"
},
{
"name": "CVE-2025-24280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24280"
},
{
"name": "CVE-2025-30452",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30452"
},
{
"name": "CVE-2025-24085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24085"
},
{
"name": "CVE-2025-24203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24203"
},
{
"name": "CVE-2025-24247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24247"
},
{
"name": "CVE-2025-24211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24211"
},
{
"name": "CVE-2025-24198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24198"
},
{
"name": "CVE-2025-24131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24131"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-24164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24164"
},
{
"name": "CVE-2025-24255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24255"
},
{
"name": "CVE-2025-24283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24283"
},
{
"name": "CVE-2024-48958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48958"
},
{
"name": "CVE-2025-24170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24170"
},
{
"name": "CVE-2025-24093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24093"
},
{
"name": "CVE-2025-24173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24173"
},
{
"name": "CVE-2025-24218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24218"
},
{
"name": "CVE-2025-24097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24097"
},
{
"name": "CVE-2025-30435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30435"
},
{
"name": "CVE-2024-40864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40864"
},
{
"name": "CVE-2025-24157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24157"
},
{
"name": "CVE-2025-24278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24278"
},
{
"name": "CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"name": "CVE-2025-24172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24172"
},
{
"name": "CVE-2025-30451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30451"
},
{
"name": "CVE-2025-24212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24212"
},
{
"name": "CVE-2025-24252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24252"
},
{
"name": "CVE-2025-24199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24199"
},
{
"name": "CVE-2025-24239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24239"
},
{
"name": "CVE-2025-24139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24139"
},
{
"name": "CVE-2025-24237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24237"
},
{
"name": "CVE-2025-24254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24254"
},
{
"name": "CVE-2025-24226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24226"
},
{
"name": "CVE-2025-24238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24238"
},
{
"name": "CVE-2025-30450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30450"
},
{
"name": "CVE-2025-24192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24192"
},
{
"name": "CVE-2025-24236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24236"
},
{
"name": "CVE-2025-24167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24167"
},
{
"name": "CVE-2025-24232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24232"
},
{
"name": "CVE-2025-31194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31194"
},
{
"name": "CVE-2025-30458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30458"
},
{
"name": "CVE-2025-24261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24261"
},
{
"name": "CVE-2025-30424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30424"
},
{
"name": "CVE-2025-30430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30430"
},
{
"name": "CVE-2025-30444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30444"
},
{
"name": "CVE-2025-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24282"
},
{
"name": "CVE-2025-24256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24256"
},
{
"name": "CVE-2025-24259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24259"
},
{
"name": "CVE-2025-24181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24181"
},
{
"name": "CVE-2025-31197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31197"
},
{
"name": "CVE-2025-24233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24233"
},
{
"name": "CVE-2025-24241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24241"
},
{
"name": "CVE-2025-24215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24215"
},
{
"name": "CVE-2025-24214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24214"
},
{
"name": "CVE-2025-30439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30439"
},
{
"name": "CVE-2025-24113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24113"
},
{
"name": "CVE-2025-30460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30460"
},
{
"name": "CVE-2025-30434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30434"
},
{
"name": "CVE-2025-31192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31192"
},
{
"name": "CVE-2025-30428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30428"
},
{
"name": "CVE-2025-24196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24196"
},
{
"name": "CVE-2025-24242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24242"
},
{
"name": "CVE-2025-30438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30438"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-30437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30437"
},
{
"name": "CVE-2025-30432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30432"
},
{
"name": "CVE-2024-54533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54533"
},
{
"name": "CVE-2025-24129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24129"
},
{
"name": "CVE-2025-24217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24217"
},
{
"name": "CVE-2025-24272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24272"
},
{
"name": "CVE-2025-24213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24213"
},
{
"name": "CVE-2025-24095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24095"
},
{
"name": "CVE-2025-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30456"
},
{
"name": "CVE-2025-24209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
},
{
"name": "CVE-2025-24276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24276"
},
{
"name": "CVE-2025-24179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24179"
},
{
"name": "CVE-2025-24208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24208"
},
{
"name": "CVE-2025-24190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24190"
},
{
"name": "CVE-2025-30441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30441"
},
{
"name": "CVE-2025-24248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24248"
},
{
"name": "CVE-2025-24243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24243"
},
{
"name": "CVE-2025-31191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31191"
},
{
"name": "CVE-2025-31184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31184"
},
{
"name": "CVE-2025-24245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24245"
},
{
"name": "CVE-2025-30470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30470"
},
{
"name": "CVE-2025-31182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31182"
},
{
"name": "CVE-2025-24251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24251"
},
{
"name": "CVE-2025-24195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24195"
},
{
"name": "CVE-2024-54543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54543"
},
{
"name": "CVE-2025-24250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24250"
},
{
"name": "CVE-2025-24234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24234"
},
{
"name": "CVE-2025-24180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24180"
},
{
"name": "CVE-2025-24177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24177"
},
{
"name": "CVE-2025-30454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30454"
},
{
"name": "CVE-2025-30461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30461"
},
{
"name": "CVE-2025-24244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24244"
},
{
"name": "CVE-2025-24230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24230"
},
{
"name": "CVE-2025-24148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24148"
},
{
"name": "CVE-2025-24163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24163"
},
{
"name": "CVE-2025-24231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24231"
},
{
"name": "CVE-2025-24277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24277"
},
{
"name": "CVE-2025-24269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24269"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2025-24201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24201"
},
{
"name": "CVE-2025-31188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31188"
},
{
"name": "CVE-2025-24202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24202"
},
{
"name": "CVE-2025-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30446"
},
{
"name": "CVE-2025-30433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30433"
},
{
"name": "CVE-2025-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30443"
},
{
"name": "CVE-2025-30426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30426"
},
{
"name": "CVE-2025-30427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
},
{
"name": "CVE-2025-31183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31183"
}
],
"initial_release_date": "2025-04-01T00:00:00",
"last_revision_date": "2025-04-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0258",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-01T00:00:00.000000"
},
{
"description": "Ajout de multiples identifiants CVE.",
"revision_date": "2025-04-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24200 et CVE-2025-24201 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122378",
"url": "https://support.apple.com/en-us/122378"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122371",
"url": "https://support.apple.com/en-us/122371"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122380",
"url": "https://support.apple.com/en-us/122380"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122379",
"url": "https://support.apple.com/en-us/122379"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122345",
"url": "https://support.apple.com/en-us/122345"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122373",
"url": "https://support.apple.com/en-us/122373"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122372",
"url": "https://support.apple.com/en-us/122372"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122377",
"url": "https://support.apple.com/en-us/122377"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122346",
"url": "https://support.apple.com/en-us/122346"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122374",
"url": "https://support.apple.com/en-us/122374"
},
{
"published_at": "2025-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 122375",
"url": "https://support.apple.com/en-us/122375"
}
]
}
NCSC-2025-0102
Vulnerability from csaf_ncscnl - Published: 2025-04-01 08:41 - Updated: 2025-04-01 08:41Summary
Kwetsbaarheden verholpen in Apple macOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Apple heeft meerdere kwetsbaarheden verholpen in macOS (Specifiek voor Ventura 13.7.5, Sequoia 15.4 en Sonoma 14.7.5).
Interpretaties: De kwetsbaarheden omvatten onder andere problemen met ongeautoriseerde toegang tot gevoelige gebruikersdata, logboekregistratie-issues, en kwetsbaarheden die het mogelijk maakten voor applicaties om root-rechten te verkrijgen. Deze kwetsbaarheden konden worden misbruikt door kwaadwillenden om toegang te krijgen tot gevoelige informatie of om systeeminstabiliteit te veroorzaken.
Oplossingen: Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-284: Improper Access Control
CWE-416: Use After Free
CWE-476: NULL Pointer Dereference
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-400: Uncontrolled Resource Consumption
CWE-770: Allocation of Resources Without Limits or Throttling
CWE-787: Out-of-bounds Write
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-20: Improper Input Validation
CWE-276: Incorrect Default Permissions
CWE-1025: Comparison Using Wrong Factors
CWE-697: Incorrect Comparison
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125: Out-of-bounds Read
CWE-275: CWE-275
CWE-862: Missing Authorization
5.3 (Medium)
6.5 (Medium)
9.8 (Critical)
7.8 (High)
8.1 (High)
CWE-276
- Incorrect Default Permissions
9.8 (Critical)
5.0 (Medium)
7.8 (High)
5.5 (Medium)
9.8 (Critical)
7.8 (High)
7.8 (High)
9.8 (Critical)
9.8 (Critical)
9.8 (Critical)
9.8 (Critical)
7.8 (High)
9.8 (Critical)
5.5 (Medium)
9.8 (Critical)
9.8 (Critical)
9.8 (Critical)
5.5 (Medium)
5.5 (Medium)
7.5 (High)
9.8 (Critical)
9.8 (Critical)
9.8 (Critical)
5.5 (Medium)
5.5 (Medium)
CWE-20
- Improper Input Validation
5.5 (Medium)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
CWE-284
- Improper Access Control
CWE-362
- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
5.5 (Medium)
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in macOS (Specifiek voor Ventura 13.7.5, Sequoia 15.4 en Sonoma 14.7.5).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten onder andere problemen met ongeautoriseerde toegang tot gevoelige gebruikersdata, logboekregistratie-issues, en kwetsbaarheden die het mogelijk maakten voor applicaties om root-rechten te verkrijgen. Deze kwetsbaarheden konden worden misbruikt door kwaadwillenden om toegang te krijgen tot gevoelige informatie of om systeeminstabiliteit te veroorzaken.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.apple.com/en-us/122375"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.apple.com/en-us/122374"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.apple.com/en-us/122373"
}
],
"title": "Kwetsbaarheden verholpen in Apple macOS",
"tracking": {
"current_release_date": "2025-04-01T08:41:09.934597Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0102",
"initial_release_date": "2025-04-01T08:41:09.934597Z",
"revision_history": [
{
"date": "2025-04-01T08:41:09.934597Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:apple/13.7",
"product": {
"name": "vers:apple/13.7",
"product_id": "CSAFPID-1251566"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=13.0|\u003c13.7.3",
"product": {
"name": "vers:unknown/\u003e=13.0|\u003c13.7.3",
"product_id": "CSAFPID-1916435"
}
},
{
"category": "product_version_range",
"name": "vers:apple/14.7",
"product": {
"name": "vers:apple/14.7",
"product_id": "CSAFPID-1251568"
}
},
{
"category": "product_version_range",
"name": "vers:apple/15.3",
"product": {
"name": "vers:apple/15.3",
"product_id": "CSAFPID-1915328"
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "product_family",
"name": "Apple"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13.7",
"product": {
"name": "vers:unknown/13.7",
"product_id": "CSAFPID-1136191"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/13.7.1",
"product": {
"name": "vers:unknown/13.7.1",
"product_id": "CSAFPID-1245683",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:13.7.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/13.7.2",
"product": {
"name": "vers:unknown/13.7.2",
"product_id": "CSAFPID-1496144"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/13.7.3",
"product": {
"name": "vers:unknown/13.7.3",
"product_id": "CSAFPID-2406261"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/ventura \u003c13.7.3",
"product": {
"name": "vers:unknown/ventura \u003c13.7.3",
"product_id": "CSAFPID-1904383"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/unspecified|\u003c13.7",
"product": {
"name": "vers:unknown/unspecified|\u003c13.7",
"product_id": "CSAFPID-1416488"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c13.7.3",
"product": {
"name": "vers:unknown/\u003c13.7.3",
"product_id": "CSAFPID-1923307",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.7",
"product": {
"name": "vers:unknown/14.7",
"product_id": "CSAFPID-1136190"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.7.1",
"product": {
"name": "vers:unknown/14.7.1",
"product_id": "CSAFPID-1245685",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:14.7.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.7.2",
"product": {
"name": "vers:unknown/14.7.2",
"product_id": "CSAFPID-1496142"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.7.3",
"product": {
"name": "vers:unknown/14.7.3",
"product_id": "CSAFPID-2406265"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c14.7.3",
"product": {
"name": "vers:unknown/\u003c14.7.3",
"product_id": "CSAFPID-1923306",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sonoma \u003c14.7.3",
"product": {
"name": "vers:unknown/sonoma \u003c14.7.3",
"product_id": "CSAFPID-1904384"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.0",
"product": {
"name": "vers:unknown/15.0",
"product_id": "CSAFPID-1245684",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:15.0:-:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.1",
"product": {
"name": "vers:unknown/15.1",
"product_id": "CSAFPID-1436077"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.1.1",
"product": {
"name": "vers:unknown/15.1.1",
"product_id": "CSAFPID-1463431"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.2",
"product": {
"name": "vers:unknown/15.2",
"product_id": "CSAFPID-1904042"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.3",
"product": {
"name": "vers:unknown/15.3",
"product_id": "CSAFPID-2492950"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/unspecified|\u003c15.4",
"product": {
"name": "vers:unknown/unspecified|\u003c15.4",
"product_id": "CSAFPID-2470109"
}
}
],
"category": "product_name",
"name": "macOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:apple/13.7.3",
"product": {
"name": "vers:apple/13.7.3",
"product_id": "CSAFPID-1902955"
}
}
],
"category": "product_name",
"name": "macOS Ventura"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2024-9681",
"cwe": {
"id": "CWE-1025",
"name": "Comparison Using Wrong Factors"
},
"notes": [
{
"category": "other",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "other",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9681",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2024-9681"
},
{
"cve": "CVE-2024-40864",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40864",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2024-40864"
},
{
"cve": "CVE-2024-48958",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-48958",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-48958.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2024-48958"
},
{
"cve": "CVE-2024-54533",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54533",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54533.json"
}
],
"title": "CVE-2024-54533"
},
{
"cve": "CVE-2024-56171",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2025-24085",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json"
}
],
"title": "CVE-2025-24085"
},
{
"cve": "CVE-2025-24093",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24093",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24093.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24093"
},
{
"cve": "CVE-2025-24097",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24097.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24097"
},
{
"cve": "CVE-2025-24113",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24113",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json"
}
],
"title": "CVE-2025-24113"
},
{
"cve": "CVE-2025-24139",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24139",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24139.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24139"
},
{
"cve": "CVE-2025-24148",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24148",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24148.json"
}
],
"title": "CVE-2025-24148"
},
{
"cve": "CVE-2025-24157",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24157",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24157.json"
}
],
"title": "CVE-2025-24157"
},
{
"cve": "CVE-2025-24163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24163"
},
{
"cve": "CVE-2025-24164",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24164",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24164.json"
}
],
"title": "CVE-2025-24164"
},
{
"cve": "CVE-2025-24167",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24167",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24167.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24167"
},
{
"cve": "CVE-2025-24170",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24170"
},
{
"cve": "CVE-2025-24172",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24172",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24172.json"
}
],
"title": "CVE-2025-24172"
},
{
"cve": "CVE-2025-24173",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24173",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24173.json"
}
],
"title": "CVE-2025-24173"
},
{
"cve": "CVE-2025-24178",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24178.json"
}
],
"title": "CVE-2025-24178"
},
{
"cve": "CVE-2025-24180",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24180",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24180.json"
}
],
"title": "CVE-2025-24180"
},
{
"cve": "CVE-2025-24181",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24181",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24181.json"
}
],
"title": "CVE-2025-24181"
},
{
"cve": "CVE-2025-24182",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24182.json"
}
],
"title": "CVE-2025-24182"
},
{
"cve": "CVE-2025-24190",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24190",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24190.json"
}
],
"title": "CVE-2025-24190"
},
{
"cve": "CVE-2025-24191",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24191",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24191.json"
}
],
"title": "CVE-2025-24191"
},
{
"cve": "CVE-2025-24192",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24192",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24192.json"
}
],
"title": "CVE-2025-24192"
},
{
"cve": "CVE-2025-24194",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24194.json"
}
],
"title": "CVE-2025-24194"
},
{
"cve": "CVE-2025-24195",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24195.json"
}
],
"title": "CVE-2025-24195"
},
{
"cve": "CVE-2025-24196",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24196.json"
}
],
"title": "CVE-2025-24196"
},
{
"cve": "CVE-2025-24198",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24198.json"
}
],
"title": "CVE-2025-24198"
},
{
"cve": "CVE-2025-24199",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24199",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24199.json"
}
],
"title": "CVE-2025-24199"
},
{
"cve": "CVE-2025-24202",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24202",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24202.json"
}
],
"title": "CVE-2025-24202"
},
{
"cve": "CVE-2025-24203",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24203.json"
}
],
"title": "CVE-2025-24203"
},
{
"cve": "CVE-2025-24204",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24204.json"
}
],
"title": "CVE-2025-24204"
},
{
"cve": "CVE-2025-24205",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24205",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24205.json"
}
],
"title": "CVE-2025-24205"
},
{
"cve": "CVE-2025-24207",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24207.json"
}
],
"title": "CVE-2025-24207"
},
{
"cve": "CVE-2025-24209",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24209.json"
}
],
"title": "CVE-2025-24209"
},
{
"cve": "CVE-2025-24210",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24210",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24210.json"
}
],
"title": "CVE-2025-24210"
},
{
"cve": "CVE-2025-24211",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24211.json"
}
],
"title": "CVE-2025-24211"
},
{
"cve": "CVE-2025-24212",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24212.json"
}
],
"title": "CVE-2025-24212"
},
{
"cve": "CVE-2025-24213",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24213.json"
}
],
"title": "CVE-2025-24213"
},
{
"cve": "CVE-2025-24214",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24214",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24214.json"
}
],
"title": "CVE-2025-24214"
},
{
"cve": "CVE-2025-24215",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24215",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24215.json"
}
],
"title": "CVE-2025-24215"
},
{
"cve": "CVE-2025-24216",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24216",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24216.json"
}
],
"title": "CVE-2025-24216"
},
{
"cve": "CVE-2025-24217",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24217",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24217.json"
}
],
"title": "CVE-2025-24217"
},
{
"cve": "CVE-2025-24218",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24218.json"
}
],
"title": "CVE-2025-24218"
},
{
"cve": "CVE-2025-24228",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24228",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24228.json"
}
],
"title": "CVE-2025-24228"
},
{
"cve": "CVE-2025-24229",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24229",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24229.json"
}
],
"title": "CVE-2025-24229"
},
{
"cve": "CVE-2025-24230",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24230.json"
}
],
"title": "CVE-2025-24230"
},
{
"cve": "CVE-2025-24231",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24231.json"
}
],
"title": "CVE-2025-24231"
},
{
"cve": "CVE-2025-24232",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24232.json"
}
],
"title": "CVE-2025-24232"
},
{
"cve": "CVE-2025-24233",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24233.json"
}
],
"title": "CVE-2025-24233"
},
{
"cve": "CVE-2025-24234",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24234",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24234"
},
{
"cve": "CVE-2025-24235",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24235",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24235.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24235"
},
{
"cve": "CVE-2025-24236",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24236.json"
}
],
"title": "CVE-2025-24236"
},
{
"cve": "CVE-2025-24237",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24237.json"
}
],
"title": "CVE-2025-24237"
},
{
"cve": "CVE-2025-24238",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24238"
},
{
"cve": "CVE-2025-24239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24239"
},
{
"cve": "CVE-2025-24240",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24240",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24240.json"
}
],
"title": "CVE-2025-24240"
},
{
"cve": "CVE-2025-24241",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24241.json"
}
],
"title": "CVE-2025-24241"
},
{
"cve": "CVE-2025-24242",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24242"
},
{
"cve": "CVE-2025-24243",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24243"
},
{
"cve": "CVE-2025-24244",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24244.json"
}
],
"title": "CVE-2025-24244"
},
{
"cve": "CVE-2025-24245",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24245",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24245.json"
}
],
"title": "CVE-2025-24245"
},
{
"cve": "CVE-2025-24246",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24246",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24246.json"
}
],
"title": "CVE-2025-24246"
},
{
"cve": "CVE-2025-24247",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24247.json"
}
],
"title": "CVE-2025-24247"
},
{
"cve": "CVE-2025-24248",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24248",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24248.json"
}
],
"title": "CVE-2025-24248"
},
{
"cve": "CVE-2025-24249",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24249",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24249.json"
}
],
"title": "CVE-2025-24249"
},
{
"cve": "CVE-2025-24250",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24250",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24250.json"
}
],
"title": "CVE-2025-24250"
},
{
"cve": "CVE-2025-24253",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24253",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24253.json"
}
],
"title": "CVE-2025-24253"
},
{
"cve": "CVE-2025-24254",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24254.json"
}
],
"title": "CVE-2025-24254"
},
{
"cve": "CVE-2025-24255",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24255",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24255.json"
}
],
"title": "CVE-2025-24255"
},
{
"cve": "CVE-2025-24256",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24256.json"
}
],
"title": "CVE-2025-24256"
},
{
"cve": "CVE-2025-24257",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24257.json"
}
],
"title": "CVE-2025-24257"
},
{
"cve": "CVE-2025-24259",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24259",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24259.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24259"
},
{
"cve": "CVE-2025-24260",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24260.json"
}
],
"title": "CVE-2025-24260"
},
{
"cve": "CVE-2025-24261",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24261.json"
}
],
"title": "CVE-2025-24261"
},
{
"cve": "CVE-2025-24262",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24262"
},
{
"cve": "CVE-2025-24263",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24263",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24263.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24263"
},
{
"cve": "CVE-2025-24264",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24264.json"
}
],
"title": "CVE-2025-24264"
},
{
"cve": "CVE-2025-24265",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24265",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24265.json"
}
],
"title": "CVE-2025-24265"
},
{
"cve": "CVE-2025-24266",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24266",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24266.json"
}
],
"title": "CVE-2025-24266"
},
{
"cve": "CVE-2025-24267",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24267",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24267.json"
}
],
"title": "CVE-2025-24267"
},
{
"cve": "CVE-2025-24269",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24269",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24269.json"
}
],
"title": "CVE-2025-24269"
},
{
"cve": "CVE-2025-24272",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24272.json"
}
],
"title": "CVE-2025-24272"
},
{
"cve": "CVE-2025-24273",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24273",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24273.json"
}
],
"title": "CVE-2025-24273"
},
{
"cve": "CVE-2025-24276",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24276",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24276.json"
}
],
"title": "CVE-2025-24276"
},
{
"cve": "CVE-2025-24277",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24277",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24277.json"
}
],
"title": "CVE-2025-24277"
},
{
"cve": "CVE-2025-24278",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24278",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24278.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24278"
},
{
"cve": "CVE-2025-24279",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24279",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24279.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24279"
},
{
"cve": "CVE-2025-24280",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24280"
},
{
"cve": "CVE-2025-24281",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24281",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24281.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-24281"
},
{
"cve": "CVE-2025-24282",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24282",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24282.json"
}
],
"title": "CVE-2025-24282"
},
{
"cve": "CVE-2025-24283",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24283",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24283.json"
}
],
"title": "CVE-2025-24283"
},
{
"cve": "CVE-2025-27113",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27113",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27113.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2025-30424",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30424",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30424.json"
}
],
"title": "CVE-2025-30424"
},
{
"cve": "CVE-2025-30425",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30425.json"
}
],
"title": "CVE-2025-30425"
},
{
"cve": "CVE-2025-30426",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30426"
},
{
"cve": "CVE-2025-30427",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30427"
},
{
"cve": "CVE-2025-30429",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30429",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30429.json"
}
],
"title": "CVE-2025-30429"
},
{
"cve": "CVE-2025-30430",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30430",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30430.json"
}
],
"title": "CVE-2025-30430"
},
{
"cve": "CVE-2025-30432",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30432",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30432.json"
}
],
"title": "CVE-2025-30432"
},
{
"cve": "CVE-2025-30433",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30433",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30433.json"
}
],
"title": "CVE-2025-30433"
},
{
"cve": "CVE-2025-30435",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30435.json"
}
],
"title": "CVE-2025-30435"
},
{
"cve": "CVE-2025-30437",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30437",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30437.json"
}
],
"title": "CVE-2025-30437"
},
{
"cve": "CVE-2025-30438",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30438",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30438.json"
}
],
"title": "CVE-2025-30438"
},
{
"cve": "CVE-2025-30439",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30439",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30439.json"
}
],
"title": "CVE-2025-30439"
},
{
"cve": "CVE-2025-30443",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30443",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30443.json"
}
],
"title": "CVE-2025-30443"
},
{
"cve": "CVE-2025-30444",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30444",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30444.json"
}
],
"title": "CVE-2025-30444"
},
{
"cve": "CVE-2025-30446",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30446"
},
{
"cve": "CVE-2025-30447",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30447",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30447"
},
{
"cve": "CVE-2025-30449",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30449",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30449.json"
}
],
"title": "CVE-2025-30449"
},
{
"cve": "CVE-2025-30450",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30450.json"
}
],
"title": "CVE-2025-30450"
},
{
"cve": "CVE-2025-30451",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30451",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30451.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30451"
},
{
"cve": "CVE-2025-30452",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30452",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30452.json"
}
],
"title": "CVE-2025-30452"
},
{
"cve": "CVE-2025-30454",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30454.json"
}
],
"title": "CVE-2025-30454"
},
{
"cve": "CVE-2025-30455",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30455",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30455.json"
}
],
"title": "CVE-2025-30455"
},
{
"cve": "CVE-2025-30456",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30456",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30456.json"
}
],
"title": "CVE-2025-30456"
},
{
"cve": "CVE-2025-30457",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30457",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30457.json"
}
],
"title": "CVE-2025-30457"
},
{
"cve": "CVE-2025-30458",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30458.json"
}
],
"title": "CVE-2025-30458"
},
{
"cve": "CVE-2025-30460",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30460",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30460.json"
}
],
"title": "CVE-2025-30460"
},
{
"cve": "CVE-2025-30461",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30461",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30461.json"
}
],
"title": "CVE-2025-30461"
},
{
"cve": "CVE-2025-30462",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30462",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30462.json"
}
],
"title": "CVE-2025-30462"
},
{
"cve": "CVE-2025-30463",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30463.json"
}
],
"title": "CVE-2025-30463"
},
{
"cve": "CVE-2025-30464",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30464.json"
}
],
"title": "CVE-2025-30464"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30465.json"
}
],
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-30467",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30467.json"
}
],
"title": "CVE-2025-30467"
},
{
"cve": "CVE-2025-30470",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30470",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30470.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-30470"
},
{
"cve": "CVE-2025-30471",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30471.json"
}
],
"title": "CVE-2025-30471"
},
{
"cve": "CVE-2025-31182",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31182.json"
}
],
"title": "CVE-2025-31182"
},
{
"cve": "CVE-2025-31183",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31183",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31183.json"
}
],
"title": "CVE-2025-31183"
},
{
"cve": "CVE-2025-31184",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31184.json"
}
],
"title": "CVE-2025-31184"
},
{
"cve": "CVE-2025-31187",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31187",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31187.json"
}
],
"title": "CVE-2025-31187"
},
{
"cve": "CVE-2025-31188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31188",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31188.json"
}
],
"title": "CVE-2025-31188"
},
{
"cve": "CVE-2025-31191",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31191",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31191.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
}
],
"title": "CVE-2025-31191"
},
{
"cve": "CVE-2025-31192",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31192",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31192.json"
}
],
"title": "CVE-2025-31192"
},
{
"cve": "CVE-2025-31194",
"product_status": {
"known_affected": [
"CSAFPID-1251566",
"CSAFPID-1136191",
"CSAFPID-1245683",
"CSAFPID-1496144",
"CSAFPID-2406261",
"CSAFPID-1902955",
"CSAFPID-1904383",
"CSAFPID-1416488",
"CSAFPID-1916435",
"CSAFPID-1923307",
"CSAFPID-1251568",
"CSAFPID-1136190",
"CSAFPID-1245685",
"CSAFPID-1496142",
"CSAFPID-2406265",
"CSAFPID-1923306",
"CSAFPID-1904384",
"CSAFPID-1915328",
"CSAFPID-1245684",
"CSAFPID-1436077",
"CSAFPID-1463431",
"CSAFPID-1904042",
"CSAFPID-2492950",
"CSAFPID-2470109"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31194.json"
}
],
"title": "CVE-2025-31194"
}
]
}
NCSC-2025-0103
Vulnerability from csaf_ncscnl - Published: 2025-04-01 08:42 - Updated: 2025-04-01 08:42Summary
Kwetsbaarheden verholpen in Apple iOS en iPadOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties: De kwetsbaarheden omvatten onder andere geheugenbeheerproblemen, ongeautoriseerde toegang tot gevoelige gebruikersdata, en de mogelijkheid voor applicaties om hun sandbox-omgevingen te ontsnappen. Deze kwetsbaarheden konden leiden tot ongeautoriseerde toegang, gegevenswijzigingen, of zelfs Denial-of-Service. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide app te installeren of link te volgen.
Oplossingen: Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-1025: Comparison Using Wrong Factors
CWE-697: Incorrect Comparison
CWE-125: Out-of-bounds Read
CWE-284: Improper Access Control
CWE-416: Use After Free
CWE-476: NULL Pointer Dereference
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-400: Uncontrolled Resource Consumption
CWE-863: Incorrect Authorization
CWE-787: Out-of-bounds Write
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-20: Improper Input Validation
CWE-276: Incorrect Default Permissions
CWE-275: CWE-275
CWE-770: Allocation of Resources Without Limits or Throttling
9.8 (Critical)
7.8 (High)
7.5 (High)
9.8 (Critical)
9.8 (Critical)
5.5 (Medium)
5.5 (Medium)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
5.5 (Medium)
6.5 (Medium)
7.8 (High)
6.5 (Medium)
7.5 (High)
CWE-787
- Out-of-bounds Write
CWE-787
- Out-of-bounds Write
8.1 (High)
CWE-276
- Incorrect Default Permissions
5.0 (Medium)
5.5 (Medium)
9.8 (Critical)
CWE-284
- Improper Access Control
8.8 (High)
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten onder andere geheugenbeheerproblemen, ongeautoriseerde toegang tot gevoelige gebruikersdata, en de mogelijkheid voor applicaties om hun sandbox-omgevingen te ontsnappen. Deze kwetsbaarheden konden leiden tot ongeautoriseerde toegang, gegevenswijzigingen, of zelfs Denial-of-Service. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide app te installeren of link te volgen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://support.apple.com/en-us/122345"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://support.apple.com/en-us/122346"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.apple.com/en-us/122372"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.apple.com/en-us/122371"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2025-04-01T08:42:27.059536Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0103",
"initial_release_date": "2025-04-01T08:42:27.059536Z",
"revision_history": [
{
"date": "2025-04-01T08:42:27.059536Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:apple/16.7.11",
"product": {
"name": "vers:apple/16.7.11",
"product_id": "CSAFPID-2588450"
}
},
{
"category": "product_version_range",
"name": "vers:apple/18.2",
"product": {
"name": "vers:apple/18.2",
"product_id": "CSAFPID-1432307"
}
},
{
"category": "product_version_range",
"name": "vers:apple/18.3",
"product": {
"name": "vers:apple/18.3",
"product_id": "CSAFPID-1902947"
}
},
{
"category": "product_version_range",
"name": "vers:apple/18.3.2",
"product": {
"name": "vers:apple/18.3.2",
"product_id": "CSAFPID-2462478"
}
},
{
"category": "product_version_range",
"name": "vers:apple/18.4",
"product": {
"name": "vers:apple/18.4",
"product_id": "CSAFPID-2588454"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c18.2",
"product": {
"name": "vers:unknown/\u003c18.2",
"product_id": "CSAFPID-1436912"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c18.3",
"product": {
"name": "vers:unknown/\u003c18.3",
"product_id": "CSAFPID-1904380"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c18.3.1",
"product": {
"name": "vers:unknown/\u003c18.3.1",
"product_id": "CSAFPID-2177846"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003c18.3.2",
"product": {
"name": "vers:unknown/\u003c18.3.2",
"product_id": "CSAFPID-2469033"
}
},
{
"category": "product_version_range",
"name": "vers:apple/15.8.4",
"product": {
"name": "vers:apple/15.8.4",
"product_id": "CSAFPID-2588452"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1332226"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/unspecified|\u003c18.2",
"product": {
"name": "vers:unknown/unspecified|\u003c18.2",
"product_id": "CSAFPID-1432291"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/unspecified|\u003c18.3",
"product": {
"name": "vers:unknown/unspecified|\u003c18.3",
"product_id": "CSAFPID-1901367"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/unspecified|\u003c18.4",
"product": {
"name": "vers:unknown/unspecified|\u003c18.4",
"product_id": "CSAFPID-2590080"
}
}
],
"category": "product_name",
"name": "iOS and iPadOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/15.0",
"product": {
"name": "vers:unknown/15.0",
"product_id": "CSAFPID-90190",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.1",
"product": {
"name": "vers:unknown/15.1",
"product_id": "CSAFPID-90119"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.2",
"product": {
"name": "vers:unknown/15.2",
"product_id": "CSAFPID-90182"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.3",
"product": {
"name": "vers:unknown/15.3",
"product_id": "CSAFPID-773820"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.4",
"product": {
"name": "vers:unknown/15.4",
"product_id": "CSAFPID-90174"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.5",
"product": {
"name": "vers:unknown/15.5",
"product_id": "CSAFPID-90216"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.6",
"product": {
"name": "vers:unknown/15.6",
"product_id": "CSAFPID-90200"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.7",
"product": {
"name": "vers:unknown/15.7",
"product_id": "CSAFPID-90232"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.8",
"product": {
"name": "vers:unknown/15.8",
"product_id": "CSAFPID-90303"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15.8.1",
"product": {
"name": "vers:unknown/15.8.1",
"product_id": "CSAFPID-821264"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.0",
"product": {
"name": "vers:unknown/16.0",
"product_id": "CSAFPID-90255"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.1",
"product": {
"name": "vers:unknown/16.1",
"product_id": "CSAFPID-90236"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.2",
"product": {
"name": "vers:unknown/16.2",
"product_id": "CSAFPID-90241"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.3",
"product": {
"name": "vers:unknown/16.3",
"product_id": "CSAFPID-90305"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.4",
"product": {
"name": "vers:unknown/16.4",
"product_id": "CSAFPID-90301"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.5",
"product": {
"name": "vers:unknown/16.5",
"product_id": "CSAFPID-90297"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.6",
"product": {
"name": "vers:unknown/16.6",
"product_id": "CSAFPID-90295"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16.7",
"product": {
"name": "vers:unknown/16.7",
"product_id": "CSAFPID-90291"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.0",
"product": {
"name": "vers:unknown/17.0",
"product_id": "CSAFPID-90302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:apple:iphone_os:17.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.1",
"product": {
"name": "vers:unknown/17.1",
"product_id": "CSAFPID-90306"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.2",
"product": {
"name": "vers:unknown/17.2",
"product_id": "CSAFPID-90307"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.3",
"product": {
"name": "vers:unknown/17.3",
"product_id": "CSAFPID-90308"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.4",
"product": {
"name": "vers:unknown/17.4",
"product_id": "CSAFPID-1077909"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.5",
"product": {
"name": "vers:unknown/17.5",
"product_id": "CSAFPID-1136180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.6",
"product": {
"name": "vers:unknown/17.6",
"product_id": "CSAFPID-1136554"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.7",
"product": {
"name": "vers:unknown/17.7",
"product_id": "CSAFPID-1136185"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/18.0",
"product": {
"name": "vers:unknown/18.0",
"product_id": "CSAFPID-1161343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:apple:iphone_os:18.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/18.1",
"product": {
"name": "vers:unknown/18.1",
"product_id": "CSAFPID-1443657"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/18.2",
"product": {
"name": "vers:unknown/18.2",
"product_id": "CSAFPID-1906294"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/18.3",
"product": {
"name": "vers:unknown/18.3",
"product_id": "CSAFPID-1987760"
}
}
],
"category": "product_name",
"name": "iPhone OS"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:apple/18.2",
"product": {
"name": "vers:apple/18.2",
"product_id": "CSAFPID-1618595"
}
},
{
"category": "product_version_range",
"name": "vers:apple/18.3",
"product": {
"name": "vers:apple/18.3",
"product_id": "CSAFPID-1915327"
}
}
],
"category": "product_name",
"name": "Iphone Os"
}
],
"category": "product_family",
"name": "Apple"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-24217",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24217",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24217.json"
}
],
"title": "CVE-2025-24217"
},
{
"cve": "CVE-2025-24221",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24221",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24221.json"
}
],
"title": "CVE-2025-24221"
},
{
"cve": "CVE-2025-24230",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24230.json"
}
],
"title": "CVE-2025-24230"
},
{
"cve": "CVE-2025-24237",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24237.json"
}
],
"title": "CVE-2025-24237"
},
{
"cve": "CVE-2025-24238",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24238"
},
{
"cve": "CVE-2025-24243",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24243"
},
{
"cve": "CVE-2025-24244",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24244.json"
}
],
"title": "CVE-2025-24244"
},
{
"cve": "CVE-2025-24257",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24257.json"
}
],
"title": "CVE-2025-24257"
},
{
"cve": "CVE-2025-24264",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24264.json"
}
],
"title": "CVE-2025-24264"
},
{
"cve": "CVE-2025-24283",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24283",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24283.json"
}
],
"title": "CVE-2025-24283"
},
{
"cve": "CVE-2025-27113",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27113",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27113.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2025-30425",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30425.json"
}
],
"title": "CVE-2025-30425"
},
{
"cve": "CVE-2025-30426",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-30426"
},
{
"cve": "CVE-2025-30427",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-30427"
},
{
"cve": "CVE-2025-30428",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30428.json"
}
],
"title": "CVE-2025-30428"
},
{
"cve": "CVE-2025-30429",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30429",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30429.json"
}
],
"title": "CVE-2025-30429"
},
{
"cve": "CVE-2025-30430",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30430",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30430.json"
}
],
"title": "CVE-2025-30430"
},
{
"cve": "CVE-2025-30432",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30432",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30432.json"
}
],
"title": "CVE-2025-30432"
},
{
"cve": "CVE-2025-30433",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30433",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30433.json"
}
],
"title": "CVE-2025-30433"
},
{
"cve": "CVE-2025-30434",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30434",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30434.json"
}
],
"title": "CVE-2025-30434"
},
{
"cve": "CVE-2025-30438",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30438",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30438.json"
}
],
"title": "CVE-2025-30438"
},
{
"cve": "CVE-2025-30439",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30439",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30439.json"
}
],
"title": "CVE-2025-30439"
},
{
"cve": "CVE-2025-30447",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30447",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-30447"
},
{
"cve": "CVE-2025-30454",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30454.json"
}
],
"title": "CVE-2025-30454"
},
{
"cve": "CVE-2025-30456",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30456",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30456.json"
}
],
"title": "CVE-2025-30456"
},
{
"cve": "CVE-2025-30463",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30463.json"
}
],
"title": "CVE-2025-30463"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30465.json"
}
],
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-30467",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30467.json"
}
],
"title": "CVE-2025-30467"
},
{
"cve": "CVE-2025-30469",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30469.json"
}
],
"title": "CVE-2025-30469"
},
{
"cve": "CVE-2025-30470",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30470",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30470.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-30470"
},
{
"cve": "CVE-2025-30471",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30471.json"
}
],
"title": "CVE-2025-30471"
},
{
"cve": "CVE-2025-31182",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31182.json"
}
],
"title": "CVE-2025-31182"
},
{
"cve": "CVE-2025-31183",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31183",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31183.json"
}
],
"title": "CVE-2025-31183"
},
{
"cve": "CVE-2025-31184",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31184.json"
}
],
"title": "CVE-2025-31184"
},
{
"cve": "CVE-2025-31191",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31191",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31191.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-31191"
},
{
"cve": "CVE-2025-31192",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31192",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31192.json"
}
],
"title": "CVE-2025-31192"
},
{
"cve": "CVE-2024-9681",
"cwe": {
"id": "CWE-1025",
"name": "Comparison Using Wrong Factors"
},
"notes": [
{
"category": "other",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "other",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9681",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2024-9681"
},
{
"cve": "CVE-2024-48958",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-48958",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-48958.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2024-48958"
},
{
"cve": "CVE-2024-54502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54502",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54502.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2024-54502"
},
{
"cve": "CVE-2024-54508",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54508",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54508.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2024-54508"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54534",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54534.json"
}
],
"title": "CVE-2024-54534"
},
{
"cve": "CVE-2024-54543",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54543",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54543.json"
}
],
"title": "CVE-2024-54543"
},
{
"cve": "CVE-2024-56171",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2025-24085",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json"
}
],
"title": "CVE-2025-24085"
},
{
"cve": "CVE-2025-24095",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24095",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24095.json"
}
],
"title": "CVE-2025-24095"
},
{
"cve": "CVE-2025-24097",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24097.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24097"
},
{
"cve": "CVE-2025-24113",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24113",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json"
}
],
"title": "CVE-2025-24113"
},
{
"cve": "CVE-2025-24163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24163"
},
{
"cve": "CVE-2025-24167",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24167",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24167.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24167"
},
{
"cve": "CVE-2025-24173",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24173",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24173.json"
}
],
"title": "CVE-2025-24173"
},
{
"cve": "CVE-2025-24178",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24178",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24178.json"
}
],
"title": "CVE-2025-24178"
},
{
"cve": "CVE-2025-24180",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24180",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24180.json"
}
],
"title": "CVE-2025-24180"
},
{
"cve": "CVE-2025-24182",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24182.json"
}
],
"title": "CVE-2025-24182"
},
{
"cve": "CVE-2025-24190",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24190",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24190.json"
}
],
"title": "CVE-2025-24190"
},
{
"cve": "CVE-2025-24192",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24192",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24192.json"
}
],
"title": "CVE-2025-24192"
},
{
"cve": "CVE-2025-24193",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24193.json"
}
],
"title": "CVE-2025-24193"
},
{
"cve": "CVE-2025-24194",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24194.json"
}
],
"title": "CVE-2025-24194"
},
{
"cve": "CVE-2025-24198",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24198.json"
}
],
"title": "CVE-2025-24198"
},
{
"cve": "CVE-2025-24200",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24200.json"
}
],
"title": "CVE-2025-24200"
},
{
"cve": "CVE-2025-24201",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
}
],
"title": "CVE-2025-24201"
},
{
"cve": "CVE-2025-24202",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24202",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24202.json"
}
],
"title": "CVE-2025-24202"
},
{
"cve": "CVE-2025-24203",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24203.json"
}
],
"title": "CVE-2025-24203"
},
{
"cve": "CVE-2025-24205",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24205",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24205.json"
}
],
"title": "CVE-2025-24205"
},
{
"cve": "CVE-2025-24208",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24208",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24208.json"
}
],
"title": "CVE-2025-24208"
},
{
"cve": "CVE-2025-24209",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24209.json"
}
],
"title": "CVE-2025-24209"
},
{
"cve": "CVE-2025-24210",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24210",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24210.json"
}
],
"title": "CVE-2025-24210"
},
{
"cve": "CVE-2025-24211",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24211.json"
}
],
"title": "CVE-2025-24211"
},
{
"cve": "CVE-2025-24212",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24212.json"
}
],
"title": "CVE-2025-24212"
},
{
"cve": "CVE-2025-24213",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24213.json"
}
],
"title": "CVE-2025-24213"
},
{
"cve": "CVE-2025-24214",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24214",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24214.json"
}
],
"title": "CVE-2025-24214"
},
{
"cve": "CVE-2025-24215",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24215",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24215.json"
}
],
"title": "CVE-2025-24215"
},
{
"cve": "CVE-2025-24216",
"product_status": {
"known_affected": [
"CSAFPID-2588450",
"CSAFPID-1432307",
"CSAFPID-1902947",
"CSAFPID-2462478",
"CSAFPID-2588454",
"CSAFPID-1436912",
"CSAFPID-1904380",
"CSAFPID-2177846",
"CSAFPID-2469033",
"CSAFPID-1332226",
"CSAFPID-1432291",
"CSAFPID-1901367",
"CSAFPID-2590080",
"CSAFPID-2588452",
"CSAFPID-90190",
"CSAFPID-90119",
"CSAFPID-90182",
"CSAFPID-773820",
"CSAFPID-90174",
"CSAFPID-90216",
"CSAFPID-90200",
"CSAFPID-90232",
"CSAFPID-90303",
"CSAFPID-821264",
"CSAFPID-90255",
"CSAFPID-90236",
"CSAFPID-90241",
"CSAFPID-90305",
"CSAFPID-90301",
"CSAFPID-90297",
"CSAFPID-90295",
"CSAFPID-90291",
"CSAFPID-90302",
"CSAFPID-90306",
"CSAFPID-90307",
"CSAFPID-90308",
"CSAFPID-1077909",
"CSAFPID-1136180",
"CSAFPID-1136554",
"CSAFPID-1136185",
"CSAFPID-1618595",
"CSAFPID-1915327",
"CSAFPID-1161343",
"CSAFPID-1443657",
"CSAFPID-1906294",
"CSAFPID-1987760"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24216",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24216.json"
}
],
"title": "CVE-2025-24216"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…