Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21385 (GCVE-0-2025-21385)
Vulnerability from cvelistv5 – Published: 2025-01-09 22:07 – Updated: 2026-02-13 19:56 Exclusively Hosted Service
VLAI?
EPSS
Title
Microsoft Purview Information Disclosure Vulnerability
Summary
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
Severity ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Microsoft Purview |
Affected:
-
|
Date Public ?
2025-01-09 08:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-21385",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-10T15:13:51.325104Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-10T15:13:58.985Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Microsoft Purview",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "-"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:office_purview:*:*:*:*:*:*:*:*",
"versionStartIncluding": "-",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-01-09T08:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T19:56:48.350Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Microsoft Purview Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385"
}
],
"tags": [
"exclusively-hosted-service"
],
"title": "Microsoft Purview Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-21385",
"datePublished": "2025-01-09T22:07:25.838Z",
"dateReserved": "2024-12-11T00:29:48.367Z",
"dateUpdated": "2026-02-13T19:56:48.350Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-21385\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-01-09T22:15:29.980\",\"lastModified\":\"2025-02-05T19:32:55.867\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[{\"sourceIdentifier\":\"secure@microsoft.com\",\"tags\":[\"exclusively-hosted-service\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Server-Side Request Forgery (SSRF) en Microsoft Purview permite a un atacante autorizado divulgar informaci\u00f3n a trav\u00e9s de una red.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7387D350-6697-4865-BF5B-1D36F1B1A8DF\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-21385\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-10T15:13:51.325104Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-10T15:13:55.423Z\"}}], \"cna\": {\"tags\": [\"exclusively-hosted-service\"], \"title\": \"Microsoft Purview Information Disclosure Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Microsoft Purview\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}]}], \"datePublic\": \"2025-01-09T08:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385\", \"name\": \"Microsoft Purview Information Disclosure Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:office_purview:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"-\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T19:56:48.350Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-21385\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-13T19:56:48.350Z\", \"dateReserved\": \"2024-12-11T00:29:48.367Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-01-09T22:07:25.838Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2025-02104
Vulnerability from cnvd - Published: 2025-02-06
VLAI Severity ?
Title
Microsoft Purview代码问题漏洞
Description
Microsoft Purview是微软提供的一项用于数据治理和合规性的服务。
Microsoft Purview存在安全漏洞,攻击者可利用该漏洞通过精心构造的请求触发服务器向内部或外部网络发送请求,进而泄露敏感信息或导致信息暴露,增加系统的安全风险。
Severity
高
Patch Name
Microsoft Purview代码问题漏洞的补丁
Patch Description
Microsoft Purview是微软提供的一项用于数据治理和合规性的服务。
Microsoft Purview存在安全漏洞,攻击者可利用该漏洞通过精心构造的请求触发服务器向内部或外部网络发送请求,进而泄露敏感信息或导致信息暴露,增加系统的安全风险。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已提供漏洞修复方案,请关注厂商主页更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385
Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-21385
Impacted products
| Name | Microsoft Microsoft Purview |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-21385",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-21385"
}
},
"description": "Microsoft Purview\u662f\u5fae\u8f6f\u63d0\u4f9b\u7684\u4e00\u9879\u7528\u4e8e\u6570\u636e\u6cbb\u7406\u548c\u5408\u89c4\u6027\u7684\u670d\u52a1\u3002\n\nMicrosoft Purview\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u6784\u9020\u7684\u8bf7\u6c42\u89e6\u53d1\u670d\u52a1\u5668\u5411\u5185\u90e8\u6216\u5916\u90e8\u7f51\u7edc\u53d1\u9001\u8bf7\u6c42\uff0c\u8fdb\u800c\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u6216\u5bfc\u81f4\u4fe1\u606f\u66b4\u9732\uff0c\u589e\u52a0\u7cfb\u7edf\u7684\u5b89\u5168\u98ce\u9669\u3002",
"formalWay": "\u5382\u5546\u5df2\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-02104",
"openTime": "2025-02-06",
"patchDescription": "Microsoft Purview\u662f\u5fae\u8f6f\u63d0\u4f9b\u7684\u4e00\u9879\u7528\u4e8e\u6570\u636e\u6cbb\u7406\u548c\u5408\u89c4\u6027\u7684\u670d\u52a1\u3002\r\n\r\nMicrosoft Purview\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u6784\u9020\u7684\u8bf7\u6c42\u89e6\u53d1\u670d\u52a1\u5668\u5411\u5185\u90e8\u6216\u5916\u90e8\u7f51\u7edc\u53d1\u9001\u8bf7\u6c42\uff0c\u8fdb\u800c\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u6216\u5bfc\u81f4\u4fe1\u606f\u66b4\u9732\uff0c\u589e\u52a0\u7cfb\u7edf\u7684\u5b89\u5168\u98ce\u9669\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Purview\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Microsoft Microsoft Purview"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-21385",
"serverity": "\u9ad8",
"submitTime": "2025-01-21",
"title": "Microsoft Purview\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e"
}
GHSA-Q57Q-P5MG-4C5W
Vulnerability from github – Published: 2025-01-10 00:30 – Updated: 2025-01-10 00:30
VLAI?
Details
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
Severity ?
8.8 (High)
{
"affected": [],
"aliases": [
"CVE-2025-21385"
],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-09T22:15:29Z",
"severity": "HIGH"
},
"details": "A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.",
"id": "GHSA-q57q-p5mg-4c5w",
"modified": "2025-01-10T00:30:36Z",
"published": "2025-01-10T00:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21385"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-21385
Vulnerability from csaf_microsoft - Published: 2025-01-14 08:00 - Updated: 2025-01-09 08:00Summary
Microsoft Purview Information Disclosure Vulnerability
Severity
Critical
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Not required. The vulnerability documented by this CVE requires no customer action to resolve.
CWE-918
- Server-Side Request Forgery (SSRF)
References
Acknowledgments
<a href="https://twitter.com/tzahpahima">Tzah Pahima</a>
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/tzahpahima\"\u003eTzah Pahima\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Not required. The vulnerability documented by this CVE requires no customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21385 Microsoft Purview Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385"
},
{
"category": "self",
"summary": "CVE-2025-21385 Microsoft Purview Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-21385.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft Purview Information Disclosure Vulnerability",
"tracking": {
"current_release_date": "2025-01-09T08:00:00.000Z",
"generator": {
"date": "2026-01-06T16:32:41.176Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-21385",
"initial_release_date": "2025-01-14T08:00:00.000Z",
"revision_history": [
{
"date": "2025-01-09T08:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"category": "product_name",
"name": "Microsoft Purview",
"product": {
"name": "Microsoft Purview",
"product_id": "12352"
}
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21385",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.\nPlease see Toward greater transparency: Unveiling Cloud Service CVEs for more information.",
"title": "Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?"
}
],
"product_status": {
"fixed": [
"12352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21385 Microsoft Purview Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385"
},
{
"category": "self",
"summary": "CVE-2025-21385 Microsoft Purview Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-21385.json"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"12352"
]
}
],
"threats": [
{
"category": "impact",
"details": "Information Disclosure"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No"
}
],
"title": "Microsoft Purview Information Disclosure Vulnerability"
}
]
}
FKIE_CVE-2025-21385
Vulnerability from fkie_nvd - Published: 2025-01-09 22:15 - Updated: 2025-02-05 19:32
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7387D350-6697-4865-BF5B-1D36F1B1A8DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en Microsoft Purview permite a un atacante autorizado divulgar informaci\u00f3n a trav\u00e9s de una red."
}
],
"id": "CVE-2025-21385",
"lastModified": "2025-02-05T19:32:55.867",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-01-09T22:15:29.980",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
NCSC-2025-0012
Vulnerability from csaf_ncscnl - Published: 2025-01-14 19:15 - Updated: 2025-01-14 19:15Summary
Kwetsbaarheden verholpen in Microsoft Office
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in diverse Office producten.
Interpretaties: Een kwaadwillende kan de kwetsbaarheden misbruiken om een beveiligingsmaatregel te omzeilen, zich voor te doen als andere gebruiker, toegang te krijgen tot gevoelige gegevens of willekeurige code uit te voeren in de context van het slachtoffer.
Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen of link te volgen.
```
Microsoft Purview:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21385 | 8.80 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Microsoft Office Word:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21363 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21338 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21346 | 7.10 | Omzeilen van beveiligingsmaatregel |
| CVE-2025-21365 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office Excel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21354 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21362 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21364 | 7.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Microsoft Office Outlook:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21357 | 6.70 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft AutoUpdate (MAU):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21360 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Office Outlook for Mac:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21361 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office Visio:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21345 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21356 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office Access:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21366 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21395 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21186 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office OneNote:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21402 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Office SharePoint:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21344 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2025-21348 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2025-21393 | 6.30 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Kans: medium
Schade: high
CWE-641: Improper Restriction of Names for Files and Other Resources
CWE-822: Untrusted Pointer Dereference
CWE-908: Use of Uninitialized Resource
CWE-426: Untrusted Search Path
CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CWE-190: Integer Overflow or Wraparound
CWE-693: Protection Mechanism Failure
CWE-285: Improper Authorization
CWE-416: Use After Free
CWE-502: Deserialization of Untrusted Data
CWE-122: Heap-based Buffer Overflow
CWE-269: Improper Privilege Management
CWE-20: Improper Input Validation
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-122
- Heap-based Buffer Overflow
CWE-190
- Integer Overflow or Wraparound
CWE-20
- Improper Input Validation
CWE-416
- Use After Free
CWE-693
- Protection Mechanism Failure
CWE-285
- Improper Authorization
CWE-822
- Untrusted Pointer Dereference
CWE-843
- Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
- Use of Uninitialized Resource
CWE-269
- Improper Privilege Management
CWE-641
- Improper Restriction of Names for Files and Other Resources
CWE-416
- Use After Free
CWE-822
- Untrusted Pointer Dereference
CWE-502
- Deserialization of Untrusted Data
CWE-426
- Untrusted Search Path
CWE-416
- Use After Free
CWE-918
- Server-Side Request Forgery (SSRF)
CWE-79
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-122
- Heap-based Buffer Overflow
CWE-641
- Improper Restriction of Names for Files and Other Resources
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in diverse Office producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een beveiligingsmaatregel te omzeilen, zich voor te doen als andere gebruiker, toegang te krijgen tot gevoelige gegevens of willekeurige code uit te voeren in de context van het slachtoffer.\n\nVoor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen of link te volgen.\n\n```\nMicrosoft Purview: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21385 | 8.80 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Word: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21363 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21338 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21346 | 7.10 | Omzeilen van beveiligingsmaatregel | \n| CVE-2025-21365 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Excel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21354 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21362 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21364 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Outlook: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21357 | 6.70 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft AutoUpdate (MAU): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21360 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Outlook for Mac: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21361 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Visio: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21345 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21356 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Access: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21366 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21395 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21186 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office OneNote: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21402 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office SharePoint: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21344 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2025-21348 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2025-21393 | 6.30 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Names for Files and Other Resources",
"title": "CWE-641"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Office",
"tracking": {
"current_release_date": "2025-01-14T19:15:33.729625Z",
"id": "NCSC-2025-0012",
"initial_release_date": "2025-01-14T19:15:33.729625Z",
"revision_history": [
{
"date": "2025-01-14T19:15:33.729625Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "microsoft_365_apps_for_enterprise",
"product": {
"name": "microsoft_365_apps_for_enterprise",
"product_id": "CSAFPID-1741358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_365_apps_for_enterprise:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_access_2016",
"product": {
"name": "microsoft_access_2016",
"product_id": "CSAFPID-1749640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_access_2016:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_access_2016__32-bit_edition_",
"product": {
"name": "microsoft_access_2016__32-bit_edition_",
"product_id": "CSAFPID-1718417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_access_2016__32-bit_edition_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_autoupdate_for_mac",
"product": {
"name": "microsoft_autoupdate_for_mac",
"product_id": "CSAFPID-1719189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_autoupdate_for_mac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_excel_2016",
"product": {
"name": "microsoft_excel_2016",
"product_id": "CSAFPID-1741364",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_excel_2016:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_2016",
"product": {
"name": "microsoft_office_2016",
"product_id": "CSAFPID-1741376",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_2016:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_2019",
"product": {
"name": "microsoft_office_2019",
"product_id": "CSAFPID-1741357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_2019:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_android",
"product": {
"name": "microsoft_office_for_android",
"product_id": "CSAFPID-1741500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_android:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_ios",
"product": {
"name": "microsoft_office_for_ios",
"product_id": "CSAFPID-1747210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_ios:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_mac",
"product": {
"name": "microsoft_office_for_mac",
"product_id": "CSAFPID-1749646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_mac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_universal",
"product": {
"name": "microsoft_office_for_universal",
"product_id": "CSAFPID-1741501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_universal:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_2021",
"product": {
"name": "microsoft_office_ltsc_2021",
"product_id": "CSAFPID-1741359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_2021:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_2024",
"product": {
"name": "microsoft_office_ltsc_2024",
"product_id": "CSAFPID-1741360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_for_mac_2021",
"product": {
"name": "microsoft_office_ltsc_for_mac_2021",
"product_id": "CSAFPID-1717981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2021:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_for_mac_2024",
"product": {
"name": "microsoft_office_ltsc_for_mac_2024",
"product_id": "CSAFPID-1741363",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_onenote",
"product": {
"name": "microsoft_onenote",
"product_id": "CSAFPID-1749643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_onenote:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_outlook_2016",
"product": {
"name": "microsoft_outlook_2016",
"product_id": "CSAFPID-1741534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_outlook_2016:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_outlook_for_mac",
"product": {
"name": "microsoft_outlook_for_mac",
"product_id": "CSAFPID-1749645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_outlook_for_mac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_purview",
"product": {
"name": "microsoft_purview",
"product_id": "CSAFPID-1748814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_purview:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_enterprise_server_2016",
"product": {
"name": "microsoft_sharepoint_enterprise_server_2016",
"product_id": "CSAFPID-1717940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_enterprise_server_2016:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_2019",
"product": {
"name": "microsoft_sharepoint_server_2019",
"product_id": "CSAFPID-1717942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_2019:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_subscription_edition",
"product": {
"name": "microsoft_sharepoint_server_subscription_edition",
"product_id": "CSAFPID-1717943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_subscription_edition:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "office_online_server",
"product": {
"name": "office_online_server",
"product_id": "CSAFPID-510412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "office_purview",
"product": {
"name": "office_purview",
"product_id": "CSAFPID-1748844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:office_purview:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "purview",
"product": {
"name": "purview",
"product_id": "CSAFPID-1748958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21186",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21186",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21186.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
}
],
"title": "CVE-2025-21186"
},
{
"cve": "CVE-2025-21338",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1749646",
"CSAFPID-1717981",
"CSAFPID-1747210",
"CSAFPID-1741500",
"CSAFPID-1741501",
"CSAFPID-1741363"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21338",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21338.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1749646",
"CSAFPID-1717981",
"CSAFPID-1747210",
"CSAFPID-1741500",
"CSAFPID-1741501",
"CSAFPID-1741363"
]
}
],
"title": "CVE-2025-21338"
},
{
"cve": "CVE-2025-21344",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21344",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21344.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
}
],
"title": "CVE-2025-21344"
},
{
"cve": "CVE-2025-21345",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21345",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21345.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360"
]
}
],
"title": "CVE-2025-21345"
},
{
"cve": "CVE-2025-21346",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741376"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21346",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21346.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741376"
]
}
],
"title": "CVE-2025-21346"
},
{
"cve": "CVE-2025-21348",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21348",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21348.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
}
],
"title": "CVE-2025-21348"
},
{
"cve": "CVE-2025-21354",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-510412",
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741363"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21354",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21354.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-510412",
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741363"
]
}
],
"title": "CVE-2025-21354"
},
{
"cve": "CVE-2025-21356",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360"
]
}
],
"title": "CVE-2025-21356"
},
{
"cve": "CVE-2025-21357",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741534"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741534"
]
}
],
"title": "CVE-2025-21357"
},
{
"cve": "CVE-2025-21360",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1719189"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21360",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21360.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1719189"
]
}
],
"title": "CVE-2025-21360"
},
{
"cve": "CVE-2025-21361",
"cwe": {
"id": "CWE-641",
"name": "Improper Restriction of Names for Files and Other Resources"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Names for Files and Other Resources",
"title": "CWE-641"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1717981",
"CSAFPID-1749645",
"CSAFPID-1741363"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21361",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21361.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1717981",
"CSAFPID-1749645",
"CSAFPID-1741363"
]
}
],
"title": "CVE-2025-21361"
},
{
"cve": "CVE-2025-21362",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-510412",
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741363",
"CSAFPID-1741364"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21362",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21362.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-510412",
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1741363",
"CSAFPID-1741364"
]
}
],
"title": "CVE-2025-21362"
},
{
"cve": "CVE-2025-21363",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741360",
"CSAFPID-1741363"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741358",
"CSAFPID-1717981",
"CSAFPID-1741360",
"CSAFPID-1741363"
]
}
],
"title": "CVE-2025-21363"
},
{
"cve": "CVE-2025-21364",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741358",
"CSAFPID-1741360"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21364",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21364.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741358",
"CSAFPID-1741360"
]
}
],
"title": "CVE-2025-21364"
},
{
"cve": "CVE-2025-21365",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741358",
"CSAFPID-1741360"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21365",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21365.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741358",
"CSAFPID-1741360"
]
}
],
"title": "CVE-2025-21365"
},
{
"cve": "CVE-2025-21366",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21366",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21366.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
}
],
"title": "CVE-2025-21366"
},
{
"cve": "CVE-2025-21385",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1748814",
"CSAFPID-1748844"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1748814",
"CSAFPID-1748844"
]
}
],
"title": "CVE-2025-21385"
},
{
"cve": "CVE-2025-21393",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21393",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21393.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1717940",
"CSAFPID-1717942",
"CSAFPID-1717943"
]
}
],
"title": "CVE-2025-21393"
},
{
"cve": "CVE-2025-21395",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21395",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1741357",
"CSAFPID-1741358",
"CSAFPID-1741359",
"CSAFPID-1741360",
"CSAFPID-1718417",
"CSAFPID-1749640"
]
}
],
"title": "CVE-2025-21395"
},
{
"cve": "CVE-2025-21402",
"cwe": {
"id": "CWE-641",
"name": "Improper Restriction of Names for Files and Other Resources"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Names for Files and Other Resources",
"title": "CWE-641"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1717981",
"CSAFPID-1741363",
"CSAFPID-1749643"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21402",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21402.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1717981",
"CSAFPID-1741363",
"CSAFPID-1749643"
]
}
],
"title": "CVE-2025-21402"
}
]
}
BDU:2025-00247
Vulnerability from fstec - Published: 09.01.2025
VLAI Severity ?
Title
Уязвимость средства управления данными Microsoft Purview, связанная с недостаточной проверкой запросов на стороне сервера, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость средства управления данными Microsoft Purview связана с недостаточной проверкой запросов на стороне сервера. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации
Severity ?
Vendor
Microsoft Corp
Software Name
Microsoft Purview
Software Version
- (Microsoft Purview)
Possible Mitigations
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385
https://github.com/advisories/GHSA-q57q-p5mg-4c5w
https://t.me/ckeArsenal/359
CWE
CWE-918
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Microsoft Purview)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.02.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-00247",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-21385",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Microsoft Purview",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u043c\u0438 Microsoft Purview, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u0435\u0440\u0432\u0435\u0440\u043d\u0430\u044f \u0444\u0430\u043b\u044c\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (CWE-918)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u043c\u0438 Microsoft Purview \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041f\u043e\u0434\u043c\u0435\u043d\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385\nhttps://github.com/advisories/GHSA-q57q-p5mg-4c5w\nhttps://t.me/ckeArsenal/359",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-918",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…