Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21029 (GCVE-0-2025-21029)
Vulnerability from cvelistv5 – Published: 2025-09-03 06:05 – Updated: 2025-09-03 13:33
VLAI?
EPSS
Summary
Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.
Severity ?
4 (Medium)
CWE
- CWE-280 - Improper handling of insufficient permission
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Samsung Mobile | Samsung Mobile Devices |
Unaffected:
SMR Sep-2025 Release in Android 13, 14, 15, 16
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-21029",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-03T13:33:27.953750Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T13:33:32.233Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Samsung Mobile Devices",
"vendor": "Samsung Mobile",
"versions": [
{
"status": "unaffected",
"version": "SMR Sep-2025 Release in Android 13, 14, 15, 16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-280: Improper handling of insufficient permission",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T06:05:34.096Z",
"orgId": "3af57064-a867-422c-b2ad-40307b65c458",
"shortName": "SamsungMobile"
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
"assignerShortName": "SamsungMobile",
"cveId": "CVE-2025-21029",
"datePublished": "2025-09-03T06:05:34.096Z",
"dateReserved": "2024-11-06T02:30:14.885Z",
"dateUpdated": "2025-09-03T13:33:32.233Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-21029\",\"sourceIdentifier\":\"mobile.security@samsung.com\",\"published\":\"2025-09-03T06:15:46.153\",\"lastModified\":\"2025-09-11T21:22:53.583\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"mobile.security@samsung.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A123EDB1-3048-44B0-8D4D-39A2B24B5F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE4D65E-8F9B-4810-AED6-95564A97D741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"70825981-F895-4BFD-9B6E-92BFF0D67023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E68B7B-BA08-4E8C-B60A-B3836C6986BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC42E785-02BF-4F27-B5CF-49572A2DBC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6239D93F-CA0E-4120-96A1-FB63276EAEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F19D02-1FFC-48AF-9CB8-063C459E7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD382E2D-0B51-4908-989A-88E083FC85BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"299284DA-85AB-4162-B858-E67E5C6C14F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38B7AB56-AB65-4557-A91C-40CA2FD12351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"858B0736-2272-4D5A-A77F-47023D21F7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D507C0-086B-4139-A560-126964DFA579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98F307E-3B01-4C17-86E5-1C6299919417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"952CA843-7CF0-4424-BDA4-3F2A93E077B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F64BAA-2E49-4919-A940-219391383D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B125ED-D939-4CBC-9E96-BBCF02402A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7DA96D-9C25-4DDA-A6BF-D998AC346B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AC19C6-D245-4C3A-90CC-A931A901EA0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA1685E-D101-46F6-8857-7F0894E07748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF85AA7B-E1C7-4946-92B4-E4D545CAACDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34114DDC-DCDA-4306-8D23-2E628873171F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6871BC1-19F4-4F0C-88D8-4000590D8D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4684DF1E-B783-4C81-A3D0-D09AD2610866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA72654-2389-4709-BC70-59EC4349A826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E346DCBD-7DEB-464F-B917-8624BE87D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B2D31-B8C3-4CC2-9B0A-E4FDC105AC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C89A24-B07F-43D2-AE83-8F4F03D6C114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F73D594-178F-4FC8-9F40-0E545E2647B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5697984D-08BA-412F-9BDF-26B658B0ADBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B97155-E841-4267-9522-A81F8B139A79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4187BA1-226E-4976-A642-2F6DAE85538E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3EF3F1-4E54-46E3-A308-69656A29FBD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F22C26-52FC-42A7-B263-0CC7770A8C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB4C4CE-7B3C-4573-87CD-28FC67B777FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB2B338-5E04-4136-939F-749A3B163656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B24866-2B3A-4A1A-8B75-EF7A7541797A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D30C02C-91FB-4D29-AF49-7903158E8FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5CA412-BAAF-4378-8ECD-95A404D4E19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB29F18-A929-432B-B20C-365401E6CA12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6D9064-844B-4D3F-AAE4-D170DF45EF8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C908A5B3-C47B-4DA1-A62F-F8FD77FF960D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C17A088-2CA1-4818-940F-2FEFA881D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C581B7EE-CD08-4D6E-8858-EA8FA631F84C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD187E2-2655-407D-87F9-135A9D45F783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBFF102-91A9-4BCC-BB43-912896BFCCEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB2A0D7-8F4F-4128-AE09-D2658D793BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F58ACB0-BA2B-4AFE-91DC-32CBD70DFD73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"401980A7-E64A-4773-83EB-C93B50AE0F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E12AB0B-728A-4478-B237-78CBAA2A44C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EEF3EC-643F-4A39-8F4C-11F0F534B589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0501033A-0D51-41E8-91A9-E72B6EE3F78D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A901EFE-90BA-474C-88D2-8A3E7D99C0E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7B3213-520A-49F0-A183-C73A37A56854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB6398C-6A3E-4146-9A5C-595BE36047BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F706F3-34F6-4D43-AE5E-C202C700A333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8B9CD3-063E-481E-BE7C-1628ADA71849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"12C17130-A0C0-49E1-8525-9D65F0275270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E010EDC6-D78E-4126-92B0-2F6A10DE76AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAA7790-A323-4ECA-834E-F19E59C571F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CE09EF7-B024-4D79-9400-C8223CDFBB86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C339A665-413D-443F-AD04-F71C161235D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB47786E-68AB-4FF1-B9D9-925D65702E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"213AC4D5-3B95-4120-B72D-A9327BADE2BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DCB465-A0F7-496E-BE45-0B5FA1508D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EFD2CA-22E5-4B7A-AC7E-8F86A3C52F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D65C03E-7BC3-491A-8621-A8C93FBA0A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECB0B7A-590C-460C-878B-9A78CB37D259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66CF415-6C4A-4AF3-B660-B2E9CF484B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"427A79D5-04E9-46BC-9D8C-471EBD28AAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B5B670-ACDE-4A64-97C5-358D79C65080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFE015F-8130-4F10-A553-420F0BB2A132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"141E541B-8FA5-4829-A413-4F1DC19E9AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFCA253F-EE13-4C52-8CB7-D72C117576D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CE3494-F7C0-497B-8491-107D31C9A91F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEA385E-3931-4438-A2A9-0357651F9B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57CB118-46CC-4CE8-ACC3-A806CD2C25A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFE0612-FA2E-4629-AE05-33245F1282FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F3023F-E65C-4871-A65A-738EFF64D365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD1F78D-EA98-4825-A0EA-703196DDE5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDB3FBE-99EC-4763-961B-2C436D864A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5746517-D8FF-4819-9B98-D06B475C6CDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B02110E-71FB-495F-86CA-F2A4E55C0E42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"931CC6D7-A42D-4482-B901-B539DFF89C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"852A1BEC-438F-4D1E-B361-87BD57D50157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DE4E96-2F23-47E5-9DFC-44EC409F37E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3F31FA-359F-4CB6-9078-CD2093D4C43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4207B265-009B-4FF8-85C5-01EBDB7701FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BADD79-26FC-4498-AFEC-C79AF6B96924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A695EEE-B9DE-4448-BC51-AF5AC592AA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC6E2318-BD4E-4540-82C3-0D461C691119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFC99BC-87AC-43AC-B815-36B7960C39D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD6766A-EC2B-4CA2-9A8E-2BA5C9E9ECF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C86A3033-9DD1-47F9-B95D-10F82A31D335\"}]}]}],\"references\":[{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-21029\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-03T13:33:27.953750Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-03T13:33:29.680Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Samsung Mobile\", \"product\": \"Samsung Mobile Devices\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"SMR Sep-2025 Release in Android 13, 14, 15, 16\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-280: Improper handling of insufficient permission\"}]}], \"providerMetadata\": {\"orgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"shortName\": \"SamsungMobile\", \"dateUpdated\": \"2025-09-03T06:05:34.096Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-21029\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-03T13:33:32.233Z\", \"dateReserved\": \"2024-11-06T02:30:14.885Z\", \"assignerOrgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"datePublished\": \"2025-09-03T06:05:34.096Z\", \"assignerShortName\": \"SamsungMobile\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-21029
Vulnerability from fkie_nvd - Published: 2025-09-03 06:15 - Updated: 2025-09-11 21:22
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "AC42E785-02BF-4F27-B5CF-49572A2DBC8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "25F19D02-1FFC-48AF-9CB8-063C459E7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "858B0736-2272-4D5A-A77F-47023D21F7D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "39F64BAA-2E49-4919-A940-219391383D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FDA1685E-D101-46F6-8857-7F0894E07748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "4684DF1E-B783-4C81-A3D0-D09AD2610866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "C35B2D31-B8C3-4CC2-9B0A-E4FDC105AC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "72B97155-E841-4267-9522-A81F8B139A79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "7EB4C4CE-7B3C-4573-87CD-28FC67B777FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2F5CA412-BAAF-4378-8ECD-95A404D4E19B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F58ACB0-BA2B-4AFE-91DC-32CBD70DFD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "26EEF3EC-643F-4A39-8F4C-11F0F534B589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "9AB6398C-6A3E-4146-9A5C-595BE36047BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "E010EDC6-D78E-4126-92B0-2F6A10DE76AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "EB47786E-68AB-4FF1-B9D9-925D65702E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "52EFD2CA-22E5-4B7A-AC7E-8F86A3C52F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "427A79D5-04E9-46BC-9D8C-471EBD28AAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FFCA253F-EE13-4C52-8CB7-D72C117576D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "CEFE0612-FA2E-4629-AE05-33245F1282FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B5746517-D8FF-4819-9B98-D06B475C6CDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*",
"matchCriteriaId": "95DE4E96-2F23-47E5-9DFC-44EC409F37E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "AB3F31FA-359F-4CB6-9078-CD2093D4C43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "4207B265-009B-4FF8-85C5-01EBDB7701FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "B9BADD79-26FC-4498-AFEC-C79AF6B96924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "3A695EEE-B9DE-4448-BC51-AF5AC592AA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "FC6E2318-BD4E-4540-82C3-0D461C691119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "DDFC99BC-87AC-43AC-B815-36B7960C39D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3FD6766A-EC2B-4CA2-9A8E-2BA5C9E9ECF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*",
"matchCriteriaId": "C86A3033-9DD1-47F9-B95D-10F82A31D335",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display."
}
],
"id": "CVE-2025-21029",
"lastModified": "2025-09-11T21:22:53.583",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4,
"source": "mobile.security@samsung.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-03T06:15:46.153",
"references": [
{
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
],
"sourceIdentifier": "mobile.security@samsung.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-FRMV-WH36-36VG
Vulnerability from github – Published: 2025-09-11 21:31 – Updated: 2025-09-11 21:31
VLAI?
Details
Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2025-21029"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-03T06:15:46Z",
"severity": "LOW"
},
"details": "Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display.",
"id": "GHSA-frmv-wh36-36vg",
"modified": "2025-09-11T21:31:54Z",
"published": "2025-09-11T21:31:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21029"
},
{
"type": "WEB",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1943
Vulnerability from csaf_certbund - Published: 2025-09-02 22:00 - Updated: 2025-09-14 22:00Summary
Samsung Android: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein lokaler Angreifer der ein Angreifer mit physischem Zugriff kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Daten zu manipulieren.
Betroffene Betriebssysteme
- Android
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer der ein Angreifer mit physischem Zugriff kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1943 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1943.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1943 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1943"
},
{
"category": "external",
"summary": "Samsung Security Updates vom 2025-09-02",
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"category": "external",
"summary": "The Hackernews vom 2025-09-02",
"url": "https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html"
}
],
"source_lang": "en-US",
"title": "Samsung Android: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-14T22:00:00.000+00:00",
"generator": {
"date": "2025-09-15T07:46:23.467+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1943",
"initial_release_date": "2025-09-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-26509, EUVD-2025-26510, EUVD-2025-26600, EUVD-2025-26511, EUVD-2025-26626, EUVD-2025-26618, EUVD-2025-26513, EUVD-2025-26512"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "3",
"summary": "Aktive Ausnutzung gemeldet"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "13 \u003cSMR-SEP-2025",
"product": {
"name": "Samsung Android 13 \u003cSMR-SEP-2025",
"product_id": "T046650"
}
},
{
"category": "product_version",
"name": "13 SMR-SEP-2025",
"product": {
"name": "Samsung Android 13 SMR-SEP-2025",
"product_id": "T046650-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:samsung:android:13__smr-sep-2025"
}
}
},
{
"category": "product_version_range",
"name": "14 \u003cSMR-SEP-2025",
"product": {
"name": "Samsung Android 14 \u003cSMR-SEP-2025",
"product_id": "T046651"
}
},
{
"category": "product_version",
"name": "14 SMR-SEP-2025",
"product": {
"name": "Samsung Android 14 SMR-SEP-2025",
"product_id": "T046651-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:samsung:android:14__smr-sep-2025"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003cSMR-SEP-2025",
"product": {
"name": "Samsung Android 15 \u003cSMR-SEP-2025",
"product_id": "T046652"
}
},
{
"category": "product_version",
"name": "15 SMR-SEP-2025",
"product": {
"name": "Samsung Android 15 SMR-SEP-2025",
"product_id": "T046652-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:samsung:android:15__smr-sep-2025"
}
}
},
{
"category": "product_version_range",
"name": "16 \u003cSMR-SEP-2025",
"product": {
"name": "Samsung Android 16 \u003cSMR-SEP-2025",
"product_id": "T046653"
}
},
{
"category": "product_version",
"name": "16 SMR-SEP-2025",
"product": {
"name": "Samsung Android 16 SMR-SEP-2025",
"product_id": "T046653-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:samsung:android:16__smr-sep-2025"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21025",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21025"
},
{
"cve": "CVE-2025-21026",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21026"
},
{
"cve": "CVE-2025-21027",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21027"
},
{
"cve": "CVE-2025-21028",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21028"
},
{
"cve": "CVE-2025-21029",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21029"
},
{
"cve": "CVE-2025-21030",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21030"
},
{
"cve": "CVE-2025-21031",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21031"
},
{
"cve": "CVE-2025-21032",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21032"
},
{
"cve": "CVE-2025-21033",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21033"
},
{
"cve": "CVE-2025-21034",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21034"
},
{
"cve": "CVE-2025-21043",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21043"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"T046650",
"T046653",
"T046651",
"T046652"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48543"
}
]
}
NCSC-2025-0273
Vulnerability from csaf_ncscnl - Published: 2025-09-04 08:15 - Updated: 2025-09-04 08:15Summary
Kwetsbaarheden verholpen in Google Android en Samsung Mobile
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.
Interpretaties
De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.
Naast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.
Google meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.
Oplossingen
Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.
Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-20
Improper Input Validation
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-129
Improper Validation of Array Index
CWE-131
Incorrect Calculation of Buffer Size
CWE-142
Improper Neutralization of Value Delimiters
CWE-280
Improper Handling of Insufficient Permissions or Privileges
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-300
Channel Accessible by Non-Endpoint
CWE-326
Inadequate Encryption Strength
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-371
CWE-371
CWE-404
Improper Resource Shutdown or Release
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-617
Reachable Assertion
CWE-668
Exposure of Resource to Wrong Sphere
CWE-787
Out-of-bounds Write
CWE-823
Use of Out-of-range Pointer Offset
CWE-862
Missing Authorization
CWE-863
Incorrect Authorization
CWE-1422
Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.\n\nNaast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.\n\nGoogle meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.\n\nZie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Value Delimiters",
"title": "CWE-142"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
},
{
"category": "external",
"summary": "Reference",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-09-04T08:15:14.806733Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0273",
"initial_release_date": "2025-09-04T08:15:14.806733Z",
"revision_history": [
{
"date": "2025-09-04T08:15:14.806733Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13 \u003c2025-09-05",
"product": {
"name": "vers:unknown/13 \u003c2025-09-05",
"product_id": "CSAFPID-3094337"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14 \u003c2025-09-05",
"product": {
"name": "vers:unknown/14 \u003c2025-09-05",
"product_id": "CSAFPID-3094338"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15 \u003c2025-09-05",
"product": {
"name": "vers:unknown/15 \u003c2025-09-05",
"product_id": "CSAFPID-3094335"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16 \u003c2025-09-05",
"product": {
"name": "vers:unknown/16 \u003c2025-09-05",
"product_id": "CSAFPID-3094336"
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product_id": "CSAFPID-3094178"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product_id": "CSAFPID-3094177"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product_id": "CSAFPID-3094180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product_id": "CSAFPID-3094179"
}
}
],
"category": "product_name",
"name": "Samsung Mobile Devices"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39810 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-39810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24023 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-24023.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-7881",
"cwe": {
"id": "CWE-1422",
"name": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2024-47898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47898 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47898.json"
}
],
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47899 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47899.json"
}
],
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49714.json"
}
],
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0076 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0076.json"
}
],
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0089 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0089.json"
}
],
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-0467",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0467 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1706.json"
}
],
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3212 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3212.json"
}
],
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-8109",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8109 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8109.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2025-20696",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20696.json"
}
],
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20703.json"
}
],
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20704.json"
}
],
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20708.json"
}
],
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21025",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21025 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21025"
},
{
"cve": "CVE-2025-21026",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21026 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21026.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21026"
},
{
"cve": "CVE-2025-21027",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21027 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21027"
},
{
"cve": "CVE-2025-21028",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21028 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21028"
},
{
"cve": "CVE-2025-21029",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21029 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21029.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21029"
},
{
"cve": "CVE-2025-21030",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21030 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21030"
},
{
"cve": "CVE-2025-21031",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21031 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21031"
},
{
"cve": "CVE-2025-21032",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21032"
},
{
"cve": "CVE-2025-21033",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21033 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21033"
},
{
"cve": "CVE-2025-21034",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21034.json"
}
],
"title": "CVE-2025-21034"
},
{
"cve": "CVE-2025-21427",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21432.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21433.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21449.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21477 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21481.json"
}
],
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21482 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21482.json"
}
],
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21483 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21483.json"
}
],
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21484 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21484.json"
}
],
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21487.json"
}
],
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21488 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21488.json"
}
],
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21755.json"
}
],
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25179 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25179.json"
}
],
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25180 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25180.json"
}
],
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26454.json"
}
],
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26464.json"
}
],
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27032.json"
}
],
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27034.json"
}
],
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27042 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27042.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27056 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27061 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32321.json"
}
],
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32323 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32323.json"
}
],
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32324 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32324.json"
}
],
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32325.json"
}
],
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32326.json"
}
],
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32327.json"
}
],
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32330.json"
}
],
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32331.json"
}
],
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32332.json"
}
],
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32333.json"
}
],
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32345 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32345.json"
}
],
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32346.json"
}
],
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32347.json"
}
],
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32349.json"
}
],
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32350.json"
}
],
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38352 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38352.json"
}
],
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46708.json"
}
],
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46710.json"
}
],
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47317.json"
}
],
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47318.json"
}
],
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47326.json"
}
],
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47328.json"
}
],
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47329.json"
}
],
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48522 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48522.json"
}
],
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48523 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48523.json"
}
],
"title": "CVE-2025-48523"
},
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48524.json"
}
],
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48526 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48526.json"
}
],
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48527.json"
}
],
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48528 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48528.json"
}
],
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48529 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48529.json"
}
],
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48531 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48531.json"
}
],
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48532 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48532.json"
}
],
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48534.json"
}
],
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48535 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48535.json"
}
],
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48537 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48537.json"
}
],
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48538.json"
}
],
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48539 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48539.json"
}
],
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48540 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48540.json"
}
],
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48541 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48541.json"
}
],
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48542 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48542.json"
}
],
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48543 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48543.json"
}
],
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48544 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48544.json"
}
],
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48545 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48545.json"
}
],
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48546 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48546.json"
}
],
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48547.json"
}
],
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48548 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48548.json"
}
],
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48549 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48549.json"
}
],
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48550.json"
}
],
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48551.json"
}
],
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48552.json"
}
],
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48553.json"
}
],
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48554.json"
}
],
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48556.json"
}
],
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48558 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48558.json"
}
],
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48559.json"
}
],
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48560 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48560.json"
}
],
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48561.json"
}
],
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48562 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48562.json"
}
],
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48563 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48563.json"
}
],
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48581 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48581.json"
}
],
"title": "CVE-2025-48581"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…