Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61830 (GCVE-0-2025-61830)
Vulnerability from cvelistv5 – Published: 2025-11-11 18:28 – Updated: 2026-02-26 16:57- CWE-863 - Incorrect Authorization (CWE-863)
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Adobe Pass |
Affected:
0 , ≤ 3.7.3
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61830",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-10T04:57:37.977923Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:57:14.939Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Adobe Pass",
"vendor": "Adobe",
"versions": [
{
"lessThanOrEqual": "3.7.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-11-11T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 7.1,
"environmentalSeverity": "HIGH",
"exploitCodeMaturity": "NOT_DEFINED",
"integrityImpact": "HIGH",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "LOW",
"modifiedAttackVector": "LOCAL",
"modifiedAvailabilityImpact": "NONE",
"modifiedConfidentialityImpact": "HIGH",
"modifiedIntegrityImpact": "HIGH",
"modifiedPrivilegesRequired": "NONE",
"modifiedScope": "UNCHANGED",
"modifiedUserInteraction": "REQUIRED",
"privilegesRequired": "NONE",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "Incorrect Authorization (CWE-863)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-11T18:30:22.648Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://helpx.adobe.com/security/products/pass/apsb25-112.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Adobe Pass | Incorrect Authorization (CWE-863)"
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2025-61830",
"datePublished": "2025-11-11T18:28:53.431Z",
"dateReserved": "2025-10-01T17:52:06.980Z",
"dateUpdated": "2026-02-26T16:57:14.939Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-61830",
"date": "2026-04-20",
"epss": "0.00029",
"percentile": "0.08017"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61830\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2025-11-11T19:15:35.130\",\"lastModified\":\"2026-03-31T18:35:05.403\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:pass_authentication:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"3.8.0\",\"matchCriteriaId\":\"B6B65F1E-38B7-4CB2-A3D9-C6A72D0CAB73\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/pass/apsb25-112.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Adobe Pass | Incorrect Authorization (CWE-863)\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N\", \"modifiedScope\": \"UNCHANGED\", \"temporalScore\": 7.1, \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"temporalSeverity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"environmentalScore\": 7.1, \"privilegesRequired\": \"NONE\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"LOCAL\", \"confidentialityImpact\": \"HIGH\", \"environmentalSeverity\": \"HIGH\", \"availabilityRequirement\": \"NOT_DEFINED\", \"modifiedIntegrityImpact\": \"HIGH\", \"modifiedUserInteraction\": \"REQUIRED\", \"modifiedAttackComplexity\": \"LOW\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"modifiedAvailabilityImpact\": \"NONE\", \"modifiedPrivilegesRequired\": \"NONE\", \"modifiedConfidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Pass\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.7.3\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2025-11-11T17:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/pass/apsb25-112.html\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"Incorrect Authorization (CWE-863)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2025-11-11T18:30:22.648Z\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61830\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-10T04:57:37.977923Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-12T14:22:38.149Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61830\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"adobe\", \"dateReserved\": \"2025-10-01T17:52:06.980Z\", \"datePublished\": \"2025-11-11T18:28:53.431Z\", \"dateUpdated\": \"2026-02-26T16:57:14.939Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2025-2800
Vulnerability from csaf_certbund - Published: 2025-12-09 23:00 - Updated: 2025-12-09 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "ColdFusion ist ein Applikationsserver sowie Framework zur Erstellung von Web basierten Applikationen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Adobe ColdFusion ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2800 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2800.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2800 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2800"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-105 vom 2025-12-09",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html"
}
],
"source_lang": "en-US",
"title": "Adobe ColdFusion: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-09T23:00:00.000+00:00",
"generator": {
"date": "2025-12-10T10:19:59.975+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2800",
"initial_release_date": "2025-12-09T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "2025 \u003cUpdate 5",
"product": {
"name": "Adobe ColdFusion 2025 \u003cUpdate 5",
"product_id": "T049269"
}
},
{
"category": "product_version",
"name": "2025 Update 5",
"product": {
"name": "Adobe ColdFusion 2025 Update 5",
"product_id": "T049269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:coldfusion:2025_update_5"
}
}
},
{
"category": "product_version_range",
"name": "2023 \u003cUpdate 17",
"product": {
"name": "Adobe ColdFusion 2023 \u003cUpdate 17",
"product_id": "T049270"
}
},
{
"category": "product_version",
"name": "2023 Update 17",
"product": {
"name": "Adobe ColdFusion 2023 Update 17",
"product_id": "T049270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:coldfusion:2023_update_17"
}
}
},
{
"category": "product_version_range",
"name": "2021 \u003cUpdate 23",
"product": {
"name": "Adobe ColdFusion 2021 \u003cUpdate 23",
"product_id": "T049271"
}
},
{
"category": "product_version",
"name": "2021 Update 23",
"product": {
"name": "Adobe ColdFusion 2021 Update 23",
"product_id": "T049271-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:coldfusion:2021_update_23"
}
}
}
],
"category": "product_name",
"name": "ColdFusion"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61808",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61808"
},
{
"cve": "CVE-2025-61809",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61809"
},
{
"cve": "CVE-2025-61810",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61810"
},
{
"cve": "CVE-2025-61811",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61811"
},
{
"cve": "CVE-2025-61812",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61812"
},
{
"cve": "CVE-2025-61813",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61813"
},
{
"cve": "CVE-2025-61821",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61821"
},
{
"cve": "CVE-2025-61822",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61822"
},
{
"cve": "CVE-2025-61823",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61823"
},
{
"cve": "CVE-2025-61830",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-61830"
},
{
"cve": "CVE-2025-64897",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-64897"
},
{
"cve": "CVE-2025-64898",
"product_status": {
"known_affected": [
"T049271",
"T049270",
"T049269"
]
},
"release_date": "2025-12-09T23:00:00.000+00:00",
"title": "CVE-2025-64898"
}
]
}
WID-SEC-W-2025-2565
Vulnerability from csaf_certbund - Published: 2025-11-11 23:00 - Updated: 2025-11-13 23:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Adobe Creative Cloud umfasst Anwendungen und Dienste f\u00fcr Video, Design, Fotografie und Web.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler oder entfernter anonymer Angreifer kann mehrere Schwachstellen in Adobe Creative Cloud ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen und einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2565 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2565.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2565 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2565"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-106 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-106.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-107 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-107.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-109 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-109.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-111 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-112 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/pass/apsb25-112.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-113 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-114 vom 2025-11-11",
"url": "https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html"
}
],
"source_lang": "en-US",
"title": "Adobe Creative Cloud Applikationen: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-13T23:00:00.000+00:00",
"generator": {
"date": "2025-11-14T08:02:22.832+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-2565",
"initial_release_date": "2025-11-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: ZDI-25-1000, ZDI-CAN-28025, ZDI-25-992, ZDI-CAN-28021, ZDI-25-993, ZDI-CAN-28071, ZDI-25-994, ZDI-CAN-28072, ZDI-25-995, ZDI-CAN-28026, ZDI-25-996, ZDI-CAN-28022, ZDI-25-997, ZDI-CAN-28027, ZDI-25-998, ZDI-CAN-28024, ZDI-25-999, ZDI-CAN-28023"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "InDesign \u003cID21.0",
"product": {
"name": "Adobe Creative Cloud InDesign \u003cID21.0",
"product_id": "T048491"
}
},
{
"category": "product_version",
"name": "InDesign ID21.0",
"product": {
"name": "Adobe Creative Cloud InDesign ID21.0",
"product_id": "T048491-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:indesign__id21.0"
}
}
},
{
"category": "product_version_range",
"name": "InDesign \u003cID20.5.1",
"product": {
"name": "Adobe Creative Cloud InDesign \u003cID20.5.1",
"product_id": "T048492"
}
},
{
"category": "product_version",
"name": "InDesign ID20.5.1",
"product": {
"name": "Adobe Creative Cloud InDesign ID20.5.1",
"product_id": "T048492-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:indesign__id20.5.1"
}
}
},
{
"category": "product_version_range",
"name": "InCopy\u202f\u003c21.0",
"product": {
"name": "Adobe Creative Cloud InCopy\u202f\u003c21.0",
"product_id": "T048494"
}
},
{
"category": "product_version",
"name": "InCopy\u202f21.0",
"product": {
"name": "Adobe Creative Cloud InCopy\u202f21.0",
"product_id": "T048494-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:incopy_21.0"
}
}
},
{
"category": "product_version_range",
"name": "InCopy\u202f\u003c20.5.1",
"product": {
"name": "Adobe Creative Cloud InCopy\u202f\u003c20.5.1",
"product_id": "T048495"
}
},
{
"category": "product_version",
"name": "InCopy\u202f20.5.1",
"product": {
"name": "Adobe Creative Cloud InCopy\u202f20.5.1",
"product_id": "T048495-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:incopy_20.5.1"
}
}
},
{
"category": "product_version_range",
"name": "Illustrator 2025 \u003c29.8.3",
"product": {
"name": "Adobe Creative Cloud Illustrator 2025 \u003c29.8.3",
"product_id": "T048496"
}
},
{
"category": "product_version",
"name": "Illustrator 2025 29.8.3",
"product": {
"name": "Adobe Creative Cloud Illustrator 2025 29.8.3",
"product_id": "T048496-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:illustrator_2025__29.8.3"
}
}
},
{
"category": "product_version_range",
"name": "Illustrator 2026 \u003c30.0",
"product": {
"name": "Adobe Creative Cloud Illustrator 2026 \u003c30.0",
"product_id": "T048497"
}
},
{
"category": "product_version",
"name": "Illustrator 2026 30.0",
"product": {
"name": "Adobe Creative Cloud Illustrator 2026 30.0",
"product_id": "T048497-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:illustrator_2026__30.0"
}
}
},
{
"category": "product_version_range",
"name": "Illustrator on iPad \u003c3.0.10",
"product": {
"name": "Adobe Creative Cloud Illustrator on iPad \u003c3.0.10",
"product_id": "T048498"
}
},
{
"category": "product_version",
"name": "Illustrator on iPad 3.0.10",
"product": {
"name": "Adobe Creative Cloud Illustrator on iPad 3.0.10",
"product_id": "T048498-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:illustrator_on_ipad__3.0.10"
}
}
},
{
"category": "product_version_range",
"name": "Pass Authentication Android SDK \u003c3.8.0",
"product": {
"name": "Adobe Creative Cloud Pass Authentication Android SDK \u003c3.8.0",
"product_id": "T048499"
}
},
{
"category": "product_version",
"name": "Pass Authentication Android SDK 3.8.0",
"product": {
"name": "Adobe Creative Cloud Pass Authentication Android SDK 3.8.0",
"product_id": "T048499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:pass_authentication_android_sdk__3.8.0"
}
}
},
{
"category": "product_version_range",
"name": "Substance 3D Stager \u003c3.1.6",
"product": {
"name": "Adobe Creative Cloud Substance 3D Stager \u003c3.1.6",
"product_id": "T048500"
}
},
{
"category": "product_version",
"name": "Substance 3D Stager 3.1.6",
"product": {
"name": "Adobe Creative Cloud Substance 3D Stager 3.1.6",
"product_id": "T048500-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:substance_3d_stager__3.1.6"
}
}
},
{
"category": "product_version_range",
"name": "Format Plugins \u003c1.1.2",
"product": {
"name": "Adobe Creative Cloud Format Plugins \u003c1.1.2",
"product_id": "T048501"
}
},
{
"category": "product_version",
"name": "Format Plugins 1.1.2",
"product": {
"name": "Adobe Creative Cloud Format Plugins 1.1.2",
"product_id": "T048501-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:creative_cloud:format_plugins__1.1.2"
}
}
}
],
"category": "product_name",
"name": "Creative Cloud"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61814",
"product_status": {
"known_affected": [
"T048492",
"T048491"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61814"
},
{
"cve": "CVE-2025-61815",
"product_status": {
"known_affected": [
"T048492",
"T048491"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61815"
},
{
"cve": "CVE-2025-61824",
"product_status": {
"known_affected": [
"T048492",
"T048491"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61824"
},
{
"cve": "CVE-2025-61832",
"product_status": {
"known_affected": [
"T048492",
"T048491"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61832"
},
{
"cve": "CVE-2025-61816",
"product_status": {
"known_affected": [
"T048494",
"T048495"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61816"
},
{
"cve": "CVE-2025-61817",
"product_status": {
"known_affected": [
"T048494",
"T048495"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61817"
},
{
"cve": "CVE-2025-61818",
"product_status": {
"known_affected": [
"T048494",
"T048495"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61818"
},
{
"cve": "CVE-2025-61820",
"product_status": {
"known_affected": [
"T048497",
"T048496"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61820"
},
{
"cve": "CVE-2025-61831",
"product_status": {
"known_affected": [
"T048497",
"T048496"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61831"
},
{
"cve": "CVE-2025-61826",
"product_status": {
"known_affected": [
"T048498"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61826"
},
{
"cve": "CVE-2025-61827",
"product_status": {
"known_affected": [
"T048498"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61827"
},
{
"cve": "CVE-2025-61828",
"product_status": {
"known_affected": [
"T048498"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61828"
},
{
"cve": "CVE-2025-61829",
"product_status": {
"known_affected": [
"T048498"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61829"
},
{
"cve": "CVE-2025-61836",
"product_status": {
"known_affected": [
"T048498"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61836"
},
{
"cve": "CVE-2025-61830",
"product_status": {
"known_affected": [
"T048499"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61830"
},
{
"cve": "CVE-2025-61833",
"product_status": {
"known_affected": [
"T048500"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61833"
},
{
"cve": "CVE-2025-61834",
"product_status": {
"known_affected": [
"T048500"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61834"
},
{
"cve": "CVE-2025-61835",
"product_status": {
"known_affected": [
"T048500"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61835"
},
{
"cve": "CVE-2025-64531",
"product_status": {
"known_affected": [
"T048500"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-64531"
},
{
"cve": "CVE-2025-61837",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61837"
},
{
"cve": "CVE-2025-61838",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61838"
},
{
"cve": "CVE-2025-61839",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61839"
},
{
"cve": "CVE-2025-61840",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61840"
},
{
"cve": "CVE-2025-61841",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61841"
},
{
"cve": "CVE-2025-61842",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61842"
},
{
"cve": "CVE-2025-61843",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61843"
},
{
"cve": "CVE-2025-61844",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61844"
},
{
"cve": "CVE-2025-61845",
"product_status": {
"known_affected": [
"T048501"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-61845"
}
]
}
NCSC-2025-0387
Vulnerability from csaf_ncscnl - Published: 2025-12-10 13:34 - Updated: 2025-12-10 13:34ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to arbitrary code execution via unrestricted file uploads by high-privileged attackers without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to improper input validation, allowing unauthorized access without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are susceptible to a Deserialization of Untrusted Data vulnerability, enabling high-privileged attackers to execute arbitrary code via malicious serialized data requiring user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Access Control issue that enables high privileged attackers to execute arbitrary code without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to improper input validation, allowing high-privileged attackers to execute arbitrary code without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an XXE attack that allows unauthorized file access on the server without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an XXE attack that allows unauthorized file access on the server without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Input Validation issue, enabling attackers to write malicious files to arbitrary file system locations without user interaction.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Restriction of XML External Entity Reference (XXE) that allows high privileged attackers to read arbitrary files on the server with user interaction.
Adobe Pass versions 3.7.3 and earlier contain an Incorrect Authorization vulnerability that enables unauthorized access through user interaction with a malicious SDK installation.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier have an Improper Access Control vulnerability allowing low privileged attackers to gain unauthorized write access, requiring user interaction for exploitation.
ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier have a vulnerability that allows unauthorized write access due to insufficiently protected credentials.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Adobe heeft kwetsbaarheden verholpen in ColdFusion (Specifiek voor versies 25.4, 23.16, 21.22 en eerder).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in de manier waarop ColdFusion omgaat met bestandsuploads, invoervalidatie, en toegang tot gegevens. Gebruikers met hoge rechten kunnen ongeoorloofde code uitvoeren of toegang krijgen tot gevoelige gegevens zonder gebruikersinteractie. Dit kan leiden tot ernstige beveiligingsinbreuken en compromittering van de integriteit van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Adobe heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html"
}
],
"title": "Kwetsbaarheden verholpen in Adobe ColdFusion",
"tracking": {
"current_release_date": "2025-12-10T13:34:08.908897Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0387",
"initial_release_date": "2025-12-10T13:34:08.908897Z",
"revision_history": [
{
"date": "2025-12-10T13:34:08.908897Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "ColdFusion"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "ColdFusion 2021"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "ColdFusion 2023"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "ColdFusion 2025"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61808",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to arbitrary code execution via unrestricted file uploads by high-privileged attackers without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61808 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61808"
},
{
"cve": "CVE-2025-61809",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to improper input validation, allowing unauthorized access without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61809 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61809"
},
{
"cve": "CVE-2025-61810",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are susceptible to a Deserialization of Untrusted Data vulnerability, enabling high-privileged attackers to execute arbitrary code via malicious serialized data requiring user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61810 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61810"
},
{
"cve": "CVE-2025-61811",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Access Control issue that enables high privileged attackers to execute arbitrary code without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61811 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61811.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61811"
},
{
"cve": "CVE-2025-61812",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to improper input validation, allowing high-privileged attackers to execute arbitrary code without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61812 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61812.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61812"
},
{
"cve": "CVE-2025-61813",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an XXE attack that allows unauthorized file access on the server without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61813 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61813"
},
{
"cve": "CVE-2025-61821",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an XXE attack that allows unauthorized file access on the server without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61821 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61821.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61821"
},
{
"cve": "CVE-2025-61822",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Input Validation issue, enabling attackers to write malicious files to arbitrary file system locations without user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61822 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61822.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61822"
},
{
"cve": "CVE-2025-61823",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier are vulnerable to an Improper Restriction of XML External Entity Reference (XXE) that allows high privileged attackers to read arbitrary files on the server with user interaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61823 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61823.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61823"
},
{
"cve": "CVE-2025-61830",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "Adobe Pass versions 3.7.3 and earlier contain an Incorrect Authorization vulnerability that enables unauthorized access through user interaction with a malicious SDK installation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61830 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61830.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-61830"
},
{
"cve": "CVE-2025-64897",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier have an Improper Access Control vulnerability allowing low privileged attackers to gain unauthorized write access, requiring user interaction for exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64897 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64897.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-64897"
},
{
"cve": "CVE-2025-64898",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "description",
"text": "ColdFusion versions 2025.4, 2023.16, 2021.22, and earlier have a vulnerability that allows unauthorized write access due to insufficiently protected credentials.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64898 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-64898"
}
]
}
CNVD-2025-29688
Vulnerability from cnvd - Published: 2025-12-02厂商已发布了漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/pass/apsb25-112.html
| Name | Adobe Pass Authentication Android SDK <=3.7.3 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-61830",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-61830"
}
},
"description": "Adobe Pass Authentication Android SDK\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u7528\u4e8e\u5b89\u5353\u5e94\u7528\u7684Java\u5e93\u3002\n\nAdobe Pass Authentication Android SDK\u5b58\u5728\u4e0d\u6b63\u786e\u6388\u6743\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u63aa\u65bd\uff0c\u83b7\u5f97\u672a\u7ecf\u6388\u6743\u7684\u8bfb\u5199\u8bbf\u95ee\u6743\u9650\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/pass/apsb25-112.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-29688",
"openTime": "2025-12-02",
"patchDescription": "Adobe Pass Authentication Android SDK\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u7528\u4e8e\u5b89\u5353\u5e94\u7528\u7684Java\u5e93\u3002\r\n\r\nAdobe Pass Authentication Android SDK\u5b58\u5728\u4e0d\u6b63\u786e\u6388\u6743\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u63aa\u65bd\uff0c\u83b7\u5f97\u672a\u7ecf\u6388\u6743\u7684\u8bfb\u5199\u8bbf\u95ee\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Pass Authentication Android SDK\u4e0d\u6b63\u786e\u6388\u6743\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Adobe Pass Authentication Android SDK \u003c=3.7.3"
},
"referenceLink": "https://helpx.adobe.com/security/products/pass/apsb25-112.html",
"serverity": "\u4e2d",
"submitTime": "2025-11-14",
"title": "Adobe Pass Authentication Android SDK\u4e0d\u6b63\u786e\u6388\u6743\u6f0f\u6d1e"
}
GHSA-FW62-7JCP-752G
Vulnerability from github – Published: 2025-11-11 21:30 – Updated: 2025-11-11 21:30Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK.
{
"affected": [],
"aliases": [
"CVE-2025-61830"
],
"database_specific": {
"cwe_ids": [
"CWE-863"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-11T19:15:35Z",
"severity": "HIGH"
},
"details": "Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK.",
"id": "GHSA-fw62-7jcp-752g",
"modified": "2025-11-11T21:30:27Z",
"published": "2025-11-11T21:30:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61830"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/pass/apsb25-112.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-1085
Vulnerability from certfr_avis - Published: 2025-12-10 - Updated: 2025-12-10
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | Acrobat | Acrobat 2020 versions antérieures à 20.005.30838 pour Windows et macOS | ||
| Adobe | Acrobat Reader | Acrobat Reader 2020 versions antérieures à 20.005.30838 pour Windows et macOS | ||
| Adobe | ColdFusion | ColdFusion 2023 versions antérieures à Update 17 | ||
| Adobe | Acrobat Reader | Acrobat Reader DC versions antérieures à 25.001.20997 pour Windows et macOS | ||
| Adobe | Acrobat | Acrobat 2024 versions antérieures à 24.001.30308 pour macOS | ||
| Adobe | Acrobat | Acrobat DC versions antérieures à 25.001.20997 pour Windows et macOS | ||
| Adobe | ColdFusion | ColdFusion 2021 versions antérieures à Update 23 | ||
| Adobe | Acrobat | Acrobat 2024 versions antérieures à 24.001.30307 pour Windows | ||
| Adobe | ColdFusion | ColdFusion 2025 versions antérieures à Update 5 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30838 pour Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30838 pour Windows et macOS",
"product": {
"name": "Acrobat Reader",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion 2023 versions ant\u00e9rieures \u00e0 Update 17",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 25.001.20997 pour Windows et macOS",
"product": {
"name": "Acrobat Reader",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30308 pour macOS ",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat DC versions ant\u00e9rieures \u00e0 25.001.20997 pour Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion 2021 versions ant\u00e9rieures \u00e0 Update 23",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30307 pour Windows ",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion 2025 versions ant\u00e9rieures \u00e0 Update 5",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-64785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64785"
},
{
"name": "CVE-2025-64898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64898"
},
{
"name": "CVE-2025-61822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61822"
},
{
"name": "CVE-2025-61830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61830"
},
{
"name": "CVE-2025-64787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64787"
},
{
"name": "CVE-2025-61811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61811"
},
{
"name": "CVE-2025-61809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61809"
},
{
"name": "CVE-2025-64897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64897"
},
{
"name": "CVE-2025-61808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61808"
},
{
"name": "CVE-2025-61812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61812"
},
{
"name": "CVE-2025-61821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61821"
},
{
"name": "CVE-2025-64899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64899"
},
{
"name": "CVE-2025-64786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64786"
},
{
"name": "CVE-2025-61813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61813"
},
{
"name": "CVE-2025-61810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61810"
}
],
"initial_release_date": "2025-12-10T00:00:00",
"last_revision_date": "2025-12-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1085",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
"vendor_advisories": [
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-119",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-119.html"
},
{
"published_at": "2025-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-105",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html"
}
]
}
FKIE_CVE-2025-61830
Vulnerability from fkie_nvd - Published: 2025-11-11 19:15 - Updated: 2026-03-31 18:35| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | https://helpx.adobe.com/security/products/pass/apsb25-112.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | pass_authentication | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:pass_authentication:*:*:*:*:*:android:*:*",
"matchCriteriaId": "B6B65F1E-38B7-4CB2-A3D9-C6A72D0CAB73",
"versionEndExcluding": "3.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK."
}
],
"id": "CVE-2025-61830",
"lastModified": "2026-03-31T18:35:05.403",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
},
"published": "2025-11-11T19:15:35.130",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/pass/apsb25-112.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.