Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61612 (GCVE-0-2025-61612)
Vulnerability from cvelistv5 – Published: 2026-03-09 09:02 – Updated: 2026-03-09 20:04
VLAI?
EPSS
Summary
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
Severity ?
7.5 (High)
CWE
- cwe-20 Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Unisoc (Shanghai) Technologies Co., Ltd. | T7300/T8100/T9100/T8200/T8300 |
Affected:
Android13/Android14/Android15/Android16
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61612",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-09T19:55:38.682639Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-09T20:04:00.974Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "T7300/T8100/T9100/T8200/T8300",
"vendor": "Unisoc (Shanghai) Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "Android13/Android14/Android15/Android16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "cwe-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-09T09:02:22.507Z",
"orgId": "63f92e9c-2193-4c24-98a9-93640392c3d3",
"shortName": "Unisoc"
},
"references": [
{
"url": "https://www.unisoc.com/en/support/announcement/2030931350138310657"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "63f92e9c-2193-4c24-98a9-93640392c3d3",
"assignerShortName": "Unisoc",
"cveId": "CVE-2025-61612",
"datePublished": "2026-03-09T09:02:22.507Z",
"dateReserved": "2025-09-28T07:27:04.798Z",
"dateUpdated": "2026-03-09T20:04:00.974Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61612\",\"sourceIdentifier\":\"security@unisoc.com\",\"published\":\"2026-03-09T09:16:01.873\",\"lastModified\":\"2026-03-09T21:16:11.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.\"},{\"lang\":\"es\",\"value\":\"En el m\u00f3dem NR, existe una posible ca\u00edda del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda llevar a una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@unisoc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879FFD0C-9B38-4CAA-B057-1086D794D469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2700BCC5-634D-4EC6-AB67-5B678D5F951D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8538774C-906D-4B03-A3E7-FA7A55E0DA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"02882AB1-7993-47DD-84A0-8DF4272D85ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:unisoc:t7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D97A60-C848-4948-A84D-80332B1D5BBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:unisoc:t8100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DA04F2-5351-4043-A330-5397E627A222\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:unisoc:t8200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC033D2C-ED1A-4EAB-A77B-8E1C88C74B0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:unisoc:t8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7743D5-B187-48D4-BC77-D8DCDF263166\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:unisoc:t9100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1F3B9D-142F-4E70-8477-E26D921EF19A\"}]}]}],\"references\":[{\"url\":\"https://www.unisoc.com/en/support/announcement/2030931350138310657\",\"source\":\"security@unisoc.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61612\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-09T19:55:38.682639Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-09T19:56:06.845Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Unisoc (Shanghai) Technologies Co., Ltd.\", \"product\": \"T7300/T8100/T9100/T8200/T8300\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android13/Android14/Android15/Android16\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.unisoc.com/en/support/announcement/2030931350138310657\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"cwe-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"63f92e9c-2193-4c24-98a9-93640392c3d3\", \"shortName\": \"Unisoc\", \"dateUpdated\": \"2026-03-09T09:02:22.507Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61612\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-09T20:04:00.974Z\", \"dateReserved\": \"2025-09-28T07:27:04.798Z\", \"assignerOrgId\": \"63f92e9c-2193-4c24-98a9-93640392c3d3\", \"datePublished\": \"2026-03-09T09:02:22.507Z\", \"assignerShortName\": \"Unisoc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-RQFR-57FH-FMG5
Vulnerability from github – Published: 2026-03-09 09:30 – Updated: 2026-03-09 09:30
VLAI?
Details
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2025-61612"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-09T09:16:01Z",
"severity": "HIGH"
},
"details": "In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.",
"id": "GHSA-rqfr-57fh-fmg5",
"modified": "2026-03-09T09:30:30Z",
"published": "2026-03-09T09:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61612"
},
{
"type": "WEB",
"url": "https://www.unisoc.com/en/support/announcement/2030931350138310657"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-61612
Vulnerability from fkie_nvd - Published: 2026-03-09 09:16 - Updated: 2026-03-09 21:16
Severity ?
Summary
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
References
| URL | Tags | ||
|---|---|---|---|
| security@unisoc.com | https://www.unisoc.com/en/support/announcement/2030931350138310657 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*",
"matchCriteriaId": "02882AB1-7993-47DD-84A0-8DF4272D85ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:unisoc:t7300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04D97A60-C848-4948-A84D-80332B1D5BBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:unisoc:t8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2DA04F2-5351-4043-A330-5397E627A222",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:unisoc:t8200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC033D2C-ED1A-4EAB-A77B-8E1C88C74B0A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:unisoc:t8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7743D5-B187-48D4-BC77-D8DCDF263166",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:unisoc:t9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D1F3B9D-142F-4E70-8477-E26D921EF19A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed."
},
{
"lang": "es",
"value": "En el m\u00f3dem NR, existe una posible ca\u00edda del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda llevar a una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales."
}
],
"id": "CVE-2025-61612",
"lastModified": "2026-03-09T21:16:11.790",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@unisoc.com",
"type": "Secondary"
}
]
},
"published": "2026-03-09T09:16:01.873",
"references": [
{
"source": "security@unisoc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.unisoc.com/en/support/announcement/2030931350138310657"
}
],
"sourceIdentifier": "security@unisoc.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2026-AVI-0231
Vulnerability from certfr_avis - Published: 2026-03-03 - Updated: 2026-03-03
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que la vulnérabilité CVE-2026-21385 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 14, 15, 16, 16-qpr2 sans les correctifs de mars 2026",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61612"
},
{
"name": "CVE-2026-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0005"
},
{
"name": "CVE-2026-20403",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20403"
},
{
"name": "CVE-2025-58409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58409"
},
{
"name": "CVE-2025-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48644"
},
{
"name": "CVE-2025-48544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48544"
},
{
"name": "CVE-2026-20425",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20425"
},
{
"name": "CVE-2025-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47398"
},
{
"name": "CVE-2026-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0015"
},
{
"name": "CVE-2026-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20422"
},
{
"name": "CVE-2025-64783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64783"
},
{
"name": "CVE-2026-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0026"
},
{
"name": "CVE-2026-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0014"
},
{
"name": "CVE-2026-20406",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20406"
},
{
"name": "CVE-2025-48577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48577"
},
{
"name": "CVE-2024-43766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43766"
},
{
"name": "CVE-2025-58407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58407"
},
{
"name": "CVE-2026-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21735"
},
{
"name": "CVE-2026-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0013"
},
{
"name": "CVE-2025-47388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47388"
},
{
"name": "CVE-2025-61616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61616"
},
{
"name": "CVE-2025-58411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58411"
},
{
"name": "CVE-2025-47339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47339"
},
{
"name": "CVE-2025-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2879"
},
{
"name": "CVE-2026-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20426"
},
{
"name": "CVE-2026-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0030"
},
{
"name": "CVE-2025-48578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48578"
},
{
"name": "CVE-2026-20428",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20428"
},
{
"name": "CVE-2025-48568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48568"
},
{
"name": "CVE-2025-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48641"
},
{
"name": "CVE-2025-47366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47366"
},
{
"name": "CVE-2025-48650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48650"
},
{
"name": "CVE-2026-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0011"
},
{
"name": "CVE-2026-20420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20420"
},
{
"name": "CVE-2026-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0023"
},
{
"name": "CVE-2026-20401",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20401"
},
{
"name": "CVE-2026-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0017"
},
{
"name": "CVE-2025-58408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58408"
},
{
"name": "CVE-2025-47397",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47397"
},
{
"name": "CVE-2025-13952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13952"
},
{
"name": "CVE-2026-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0031"
},
{
"name": "CVE-2025-47395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47395"
},
{
"name": "CVE-2026-20404",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20404"
},
{
"name": "CVE-2026-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0020"
},
{
"name": "CVE-2025-48630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48630"
},
{
"name": "CVE-2025-48585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48585"
},
{
"name": "CVE-2025-48635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48635"
},
{
"name": "CVE-2025-48567",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48567"
},
{
"name": "CVE-2025-48574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48574"
},
{
"name": "CVE-2026-0035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0035"
},
{
"name": "CVE-2026-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0024"
},
{
"name": "CVE-2025-64893",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64893"
},
{
"name": "CVE-2025-48634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48634"
},
{
"name": "CVE-2025-47396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47396"
},
{
"name": "CVE-2025-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48653"
},
{
"name": "CVE-2026-0032",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0032"
},
{
"name": "CVE-2026-20427",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20427"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2025-69279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69279"
},
{
"name": "CVE-2026-20434",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20434"
},
{
"name": "CVE-2025-48642",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48642"
},
{
"name": "CVE-2026-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0025"
},
{
"name": "CVE-2025-20761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20761"
},
{
"name": "CVE-2025-10865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10865"
},
{
"name": "CVE-2025-48587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48587"
},
{
"name": "CVE-2026-0038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0038"
},
{
"name": "CVE-2025-48619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48619"
},
{
"name": "CVE-2025-47378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47378"
},
{
"name": "CVE-2025-48613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48613"
},
{
"name": "CVE-2025-47402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47402"
},
{
"name": "CVE-2025-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47346"
},
{
"name": "CVE-2026-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0006"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2025-69278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69278"
},
{
"name": "CVE-2026-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20421"
},
{
"name": "CVE-2025-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48646"
},
{
"name": "CVE-2025-48609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48609"
},
{
"name": "CVE-2025-47394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47394"
},
{
"name": "CVE-2025-48631",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48631"
},
{
"name": "CVE-2026-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0010"
},
{
"name": "CVE-2025-61614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61614"
},
{
"name": "CVE-2025-32313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32313"
},
{
"name": "CVE-2026-20402",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20402"
},
{
"name": "CVE-2026-21385",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21385"
},
{
"name": "CVE-2025-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47385"
},
{
"name": "CVE-2026-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0007"
},
{
"name": "CVE-2025-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20794"
},
{
"name": "CVE-2026-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0034"
},
{
"name": "CVE-2026-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0012"
},
{
"name": "CVE-2026-0008",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0008"
},
{
"name": "CVE-2026-0047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0047"
},
{
"name": "CVE-2024-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43859"
},
{
"name": "CVE-2025-48602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48602"
},
{
"name": "CVE-2025-61615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61615"
},
{
"name": "CVE-2026-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0028"
},
{
"name": "CVE-2025-48654",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48654"
},
{
"name": "CVE-2025-48605",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48605"
},
{
"name": "CVE-2025-47348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47348"
},
{
"name": "CVE-2025-20795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20795"
},
{
"name": "CVE-2025-59600",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59600"
},
{
"name": "CVE-2025-20760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20760"
},
{
"name": "CVE-2025-64784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64784"
},
{
"name": "CVE-2025-61613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61613"
},
{
"name": "CVE-2025-20762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20762"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-20793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20793"
},
{
"name": "CVE-2025-48582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48582"
},
{
"name": "CVE-2026-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0027"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2026-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0021"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2026-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0037"
},
{
"name": "CVE-2025-48645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48645"
},
{
"name": "CVE-2025-48579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48579"
},
{
"name": "CVE-2026-20405",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20405"
},
{
"name": "CVE-2026-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0029"
}
],
"initial_release_date": "2026-03-03T00:00:00",
"last_revision_date": "2026-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0231",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2026-21385 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2026/2026-03-01?hl=fr"
}
]
}
WID-SEC-W-2026-0569
Vulnerability from csaf_certbund - Published: 2026-03-02 23:00 - Updated: 2026-03-09 23:00Summary
Google Android: Mehrere Schwachstellen
Severity
Kritisch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um sich erweiterte Berechtigungen zu verschaffen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder andere nicht näher spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Android
References
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um sich erweiterte Berechtigungen zu verschaffen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0569 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0569.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0569 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0569"
},
{
"category": "external",
"summary": "Android Security Bulletin\u2014March 2026 vom 2026-03-02",
"url": "https://source.android.com/docs/security/bulletin/2026/2026-03-01"
}
],
"source_lang": "en-US",
"title": "Google Android: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-09T23:00:00.000+00:00",
"generator": {
"date": "2026-03-10T09:16:50.471+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0569",
"initial_release_date": "2026-03-02T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-208387, EUVD-2025-208386, EUVD-2025-208388, EUVD-2025-208389, EUVD-2025-208390, EUVD-2025-208392, EUVD-2025-208391, EUVD-2025-208393, EUVD-2025-208394, EUVD-2025-208396"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2025-208395"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "14 \u003c2026-03-01",
"product": {
"name": "Google Android 14 \u003c2026-03-01",
"product_id": "T051339"
}
},
{
"category": "product_version",
"name": "14 2026-03-01",
"product": {
"name": "Google Android 14 2026-03-01",
"product_id": "T051339-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:14__2026-03-01"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003c2026-03-01",
"product": {
"name": "Google Android 15 \u003c2026-03-01",
"product_id": "T051340"
}
},
{
"category": "product_version",
"name": "15 2026-03-01",
"product": {
"name": "Google Android 15 2026-03-01",
"product_id": "T051340-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:15__2026-03-01"
}
}
},
{
"category": "product_version_range",
"name": "16-qpr2 \u003c2026-03-01",
"product": {
"name": "Google Android 16-qpr2 \u003c2026-03-01",
"product_id": "T051342"
}
},
{
"category": "product_version",
"name": "16-qpr2 2026-03-01",
"product": {
"name": "Google Android 16-qpr2 2026-03-01",
"product_id": "T051342-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:16-qpr2__2026-03-01"
}
}
},
{
"category": "product_version_range",
"name": "16 \u003c2026-03-01",
"product": {
"name": "Google Android 16 \u003c2026-03-01",
"product_id": "T051343"
}
},
{
"category": "product_version",
"name": "16 2026-03-01",
"product": {
"name": "Google Android 16 2026-03-01",
"product_id": "T051343-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:16__2026-03-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2026-03-05",
"product": {
"name": "Google Android \u003c2026-03-05",
"product_id": "T051344"
}
},
{
"category": "product_version",
"name": "2026-03-05",
"product": {
"name": "Google Android 2026-03-05",
"product_id": "T051344-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:2026-03-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-43766",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2024-43766"
},
{
"cve": "CVE-2024-43859",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2024-43859"
},
{
"cve": "CVE-2025-10865",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-10865"
},
{
"cve": "CVE-2025-13952",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-13952"
},
{
"cve": "CVE-2025-20760",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20760"
},
{
"cve": "CVE-2025-20761",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20761"
},
{
"cve": "CVE-2025-20762",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20762"
},
{
"cve": "CVE-2025-20793",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20793"
},
{
"cve": "CVE-2025-20794",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20794"
},
{
"cve": "CVE-2025-20795",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-20795"
},
{
"cve": "CVE-2025-2879",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-2879"
},
{
"cve": "CVE-2025-32313",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-32313"
},
{
"cve": "CVE-2025-38616",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-38616"
},
{
"cve": "CVE-2025-38618",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-38618"
},
{
"cve": "CVE-2025-39682",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39946",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-39946"
},
{
"cve": "CVE-2025-40266",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-40266"
},
{
"cve": "CVE-2025-47339",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47339"
},
{
"cve": "CVE-2025-47346",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47346"
},
{
"cve": "CVE-2025-47348",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47348"
},
{
"cve": "CVE-2025-47366",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47366"
},
{
"cve": "CVE-2025-47378",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47378"
},
{
"cve": "CVE-2025-47385",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47385"
},
{
"cve": "CVE-2025-47388",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47388"
},
{
"cve": "CVE-2025-47394",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47394"
},
{
"cve": "CVE-2025-47395",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47395"
},
{
"cve": "CVE-2025-47396",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47396"
},
{
"cve": "CVE-2025-47397",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47397"
},
{
"cve": "CVE-2025-47398",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47398"
},
{
"cve": "CVE-2025-47402",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-47402"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48567",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48567"
},
{
"cve": "CVE-2025-48568",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48568"
},
{
"cve": "CVE-2025-48574",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48574"
},
{
"cve": "CVE-2025-48577",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48577"
},
{
"cve": "CVE-2025-48578",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48578"
},
{
"cve": "CVE-2025-48579",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48579"
},
{
"cve": "CVE-2025-48582",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48582"
},
{
"cve": "CVE-2025-48585",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48585"
},
{
"cve": "CVE-2025-48587",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48587"
},
{
"cve": "CVE-2025-48602",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48602"
},
{
"cve": "CVE-2025-48605",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48605"
},
{
"cve": "CVE-2025-48609",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48609"
},
{
"cve": "CVE-2025-48613",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48613"
},
{
"cve": "CVE-2025-48619",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48619"
},
{
"cve": "CVE-2025-48630",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48630"
},
{
"cve": "CVE-2025-48631",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48631"
},
{
"cve": "CVE-2025-48634",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48634"
},
{
"cve": "CVE-2025-48635",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48635"
},
{
"cve": "CVE-2025-48641",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48641"
},
{
"cve": "CVE-2025-48642",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48642"
},
{
"cve": "CVE-2025-48644",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48644"
},
{
"cve": "CVE-2025-48645",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48645"
},
{
"cve": "CVE-2025-48646",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48646"
},
{
"cve": "CVE-2025-48650",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48650"
},
{
"cve": "CVE-2025-48653",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48653"
},
{
"cve": "CVE-2025-48654",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-48654"
},
{
"cve": "CVE-2025-58407",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-58407"
},
{
"cve": "CVE-2025-58408",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-58408"
},
{
"cve": "CVE-2025-58409",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-58409"
},
{
"cve": "CVE-2025-58411",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-58411"
},
{
"cve": "CVE-2025-59600",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-59600"
},
{
"cve": "CVE-2025-61612",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-61612"
},
{
"cve": "CVE-2025-61613",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-61613"
},
{
"cve": "CVE-2025-61614",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-61614"
},
{
"cve": "CVE-2025-61615",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-61615"
},
{
"cve": "CVE-2025-61616",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-61616"
},
{
"cve": "CVE-2025-64783",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-64783"
},
{
"cve": "CVE-2025-64784",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-64784"
},
{
"cve": "CVE-2025-64893",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-64893"
},
{
"cve": "CVE-2025-69278",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-69278"
},
{
"cve": "CVE-2025-69279",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2025-69279"
},
{
"cve": "CVE-2026-0005",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0005"
},
{
"cve": "CVE-2026-0006",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0006"
},
{
"cve": "CVE-2026-0007",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0007"
},
{
"cve": "CVE-2026-0008",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0008"
},
{
"cve": "CVE-2026-0010",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0010"
},
{
"cve": "CVE-2026-0011",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0011"
},
{
"cve": "CVE-2026-0012",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0012"
},
{
"cve": "CVE-2026-0013",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0013"
},
{
"cve": "CVE-2026-0014",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0014"
},
{
"cve": "CVE-2026-0015",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0015"
},
{
"cve": "CVE-2026-0017",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0017"
},
{
"cve": "CVE-2026-0020",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0020"
},
{
"cve": "CVE-2026-0021",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0021"
},
{
"cve": "CVE-2026-0023",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0023"
},
{
"cve": "CVE-2026-0024",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0024"
},
{
"cve": "CVE-2026-0025",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0025"
},
{
"cve": "CVE-2026-0026",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0026"
},
{
"cve": "CVE-2026-0027",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0027"
},
{
"cve": "CVE-2026-0028",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0028"
},
{
"cve": "CVE-2026-0029",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0029"
},
{
"cve": "CVE-2026-0030",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0030"
},
{
"cve": "CVE-2026-0031",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0031"
},
{
"cve": "CVE-2026-0032",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0032"
},
{
"cve": "CVE-2026-0034",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0034"
},
{
"cve": "CVE-2026-0035",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0035"
},
{
"cve": "CVE-2026-0037",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0037"
},
{
"cve": "CVE-2026-0038",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0038"
},
{
"cve": "CVE-2026-0047",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-0047"
},
{
"cve": "CVE-2026-20401",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20401"
},
{
"cve": "CVE-2026-20402",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20402"
},
{
"cve": "CVE-2026-20403",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20403"
},
{
"cve": "CVE-2026-20404",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20404"
},
{
"cve": "CVE-2026-20405",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20405"
},
{
"cve": "CVE-2026-20406",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20406"
},
{
"cve": "CVE-2026-20420",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20420"
},
{
"cve": "CVE-2026-20421",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20421"
},
{
"cve": "CVE-2026-20422",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20422"
},
{
"cve": "CVE-2026-20425",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20425"
},
{
"cve": "CVE-2026-20426",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20426"
},
{
"cve": "CVE-2026-20427",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20427"
},
{
"cve": "CVE-2026-20428",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20428"
},
{
"cve": "CVE-2026-20434",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-20434"
},
{
"cve": "CVE-2026-21385",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-21385"
},
{
"cve": "CVE-2026-21735",
"product_status": {
"known_affected": [
"T051340",
"T051339",
"T051342",
"T051344",
"T051343"
]
},
"release_date": "2026-03-02T23:00:00.000+00:00",
"title": "CVE-2026-21735"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…