Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-47317 (GCVE-0-2025-47317)
Vulnerability from cvelistv5 – Published: 2025-09-24 15:33 – Updated: 2026-02-26 17:48- CWE-126 - Buffer Over-read
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon |
Affected:
FastConnect 6200
Affected: FastConnect 6700 Affected: FastConnect 7800 Affected: QCC5161 Affected: QCC710 Affected: QCC711 Affected: QCC7225 Affected: QCC7226 Affected: QCC7228 Affected: QMP1000 Affected: S3 Gen 2 Sound Platform Affected: S3 Sound Platform Affected: S5 Gen 2 Sound Platform Affected: S5 Sound Platform Affected: SM6475 Affected: SM6650 Affected: SM6650P Affected: SM7435 Affected: SM7550 Affected: SM7550P Affected: SM7635 Affected: SM7635P Affected: SM7675 Affected: SM7675P Affected: SM8635 Affected: SM8635P Affected: SM8735 Affected: SM8750 Affected: SM8750P Affected: Snapdragon 6 Gen 1 Mobile Platform Affected: WCD9370 Affected: WCD9371 Affected: WCD9375 Affected: WCD9378 Affected: WCD9385 Affected: WCD9390 Affected: WCD9395 Affected: WCN3988 Affected: WCN6650 Affected: WCN6755 Affected: WCN7750 Affected: WCN7860 Affected: WCN7861 Affected: WCN7880 Affected: WCN7881 Affected: WSA8810 Affected: WSA8815 Affected: WSA8830 Affected: WSA8832 Affected: WSA8835 Affected: WSA8840 Affected: WSA8845 Affected: WSA8845H |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-47317",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-25T03:55:42.780277Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:48:09.594Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Snapdragon CCW",
"Snapdragon Consumer IOT",
"Snapdragon Industrial IOT",
"Snapdragon MC",
"Snapdragon Mobile",
"Snapdragon Voice \u0026 Music"
],
"product": "Snapdragon",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "FastConnect 6200"
},
{
"status": "affected",
"version": "FastConnect 6700"
},
{
"status": "affected",
"version": "FastConnect 7800"
},
{
"status": "affected",
"version": "QCC5161"
},
{
"status": "affected",
"version": "QCC710"
},
{
"status": "affected",
"version": "QCC711"
},
{
"status": "affected",
"version": "QCC7225"
},
{
"status": "affected",
"version": "QCC7226"
},
{
"status": "affected",
"version": "QCC7228"
},
{
"status": "affected",
"version": "QMP1000"
},
{
"status": "affected",
"version": "S3 Gen 2 Sound Platform"
},
{
"status": "affected",
"version": "S3 Sound Platform"
},
{
"status": "affected",
"version": "S5 Gen 2 Sound Platform"
},
{
"status": "affected",
"version": "S5 Sound Platform"
},
{
"status": "affected",
"version": "SM6475"
},
{
"status": "affected",
"version": "SM6650"
},
{
"status": "affected",
"version": "SM6650P"
},
{
"status": "affected",
"version": "SM7435"
},
{
"status": "affected",
"version": "SM7550"
},
{
"status": "affected",
"version": "SM7550P"
},
{
"status": "affected",
"version": "SM7635"
},
{
"status": "affected",
"version": "SM7635P"
},
{
"status": "affected",
"version": "SM7675"
},
{
"status": "affected",
"version": "SM7675P"
},
{
"status": "affected",
"version": "SM8635"
},
{
"status": "affected",
"version": "SM8635P"
},
{
"status": "affected",
"version": "SM8735"
},
{
"status": "affected",
"version": "SM8750"
},
{
"status": "affected",
"version": "SM8750P"
},
{
"status": "affected",
"version": "Snapdragon 6 Gen 1 Mobile Platform"
},
{
"status": "affected",
"version": "WCD9370"
},
{
"status": "affected",
"version": "WCD9371"
},
{
"status": "affected",
"version": "WCD9375"
},
{
"status": "affected",
"version": "WCD9378"
},
{
"status": "affected",
"version": "WCD9385"
},
{
"status": "affected",
"version": "WCD9390"
},
{
"status": "affected",
"version": "WCD9395"
},
{
"status": "affected",
"version": "WCN3988"
},
{
"status": "affected",
"version": "WCN6650"
},
{
"status": "affected",
"version": "WCN6755"
},
{
"status": "affected",
"version": "WCN7750"
},
{
"status": "affected",
"version": "WCN7860"
},
{
"status": "affected",
"version": "WCN7861"
},
{
"status": "affected",
"version": "WCN7880"
},
{
"status": "affected",
"version": "WCN7881"
},
{
"status": "affected",
"version": "WSA8810"
},
{
"status": "affected",
"version": "WSA8815"
},
{
"status": "affected",
"version": "WSA8830"
},
{
"status": "affected",
"version": "WSA8832"
},
{
"status": "affected",
"version": "WSA8835"
},
{
"status": "affected",
"version": "WSA8840"
},
{
"status": "affected",
"version": "WSA8845"
},
{
"status": "affected",
"version": "WSA8845H"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption due to global buffer overflow when a test command uses an invalid payload type."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126 Buffer Over-read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-24T15:33:49.869Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html"
}
],
"title": "Buffer Over-read in BT Controller"
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2025-47317",
"datePublished": "2025-09-24T15:33:49.869Z",
"dateReserved": "2025-05-06T08:33:16.260Z",
"dateUpdated": "2026-02-26T17:48:09.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-47317\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2025-09-24T16:15:36.920\",\"lastModified\":\"2025-09-25T16:04:08.330\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory corruption due to global buffer overflow when a test command uses an invalid payload type.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE1CBDE-3D28-463C-B215-AA7DF373EF09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B82E87-F3F4-466F-A76B-C8809121FF6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419A132E-E42C-4395-B74B-788A39DF1D13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638DBC7F-456F-487D-BED2-2214DFF8BEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc5161_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E46C3967-D2BE-424F-95B8-A3689677AE57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc5161:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73C21D3B-E8E4-4384-9F80-B448A90AB1EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A75D017-032F-4369-917C-567EE2A809F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107F0423-608C-404D-B58B-616A6494418F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc711_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20DED6B-1CEF-4FC8-A6C9-176E34322D5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc711:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F9CA40D-1164-4A00-A722-EC1FBE839705\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc7225_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7553D09E-E6F3-46C4-9FE0-750CFB7D0CA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc7225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBACEC44-6028-438A-8375-8EEBAD3B16C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc7226_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF65E4DE-F031-4611-A9F8-80E633B50F70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc7226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B3DDE7-D13F-4DE3-B2DD-986B0BF07C7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc7228_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96822D1A-40C7-4FF8-B00D-1FE59B21FB8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc7228:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4D966B-7F0B-46A2-9967-75231F15B113\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5298473D-8B34-42E6-BC32-69A3800972B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A1CF44E-FFC2-4DCB-8DC2-46422D912448\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:s3_gen_2_sound_platform_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8170481D-548A-4D15-A083-48FE1901F0C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:s3_gen_2_sound_platform:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"898088E3-56FD-4E5A-A26C-4FC073475BC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:s3_sound_platform_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D506D526-9141-45EB-BB2F-07ED3696AF90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:s3_sound_platform:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B3BAEA-4432-4081-A450-B6F02A65FAF5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:s5_gen_2_sound_platform_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F7C9DF-2C1C-454D-9A4A-1953ACA05FAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:s5_gen_2_sound_platform:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF12649-B9DC-49A1-BD2A-C298B33B3F87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:s5_sound_platform_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD2CF5B-DAD6-49FB-9919-C4336733A6A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:s5_sound_platform:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05153F92-EC0E-4FD1-95FF-DCD1BB4D868A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm6475_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B685E79-9C6B-4A60-9176-D55358163800\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm6475:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BD7F1F-4582-4CA9-95AD-F420E7F2BED4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB505DE-5B4A-4CFA-BA99-1307DBF96A43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39296E3C-4E0F-4B90-A3C0-CA9C9F74CBB6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm6650p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09020F3F-C869-42DF-BD9C-E78056CC8123\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm6650p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8272228-2D68-45F2-A670-B5D6E90D9C14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A95A9E-617A-4D3A-9A4E-0C0A29B3C8B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3559292E-B5A6-4F88-BC20-F6AA85F07C97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA5CE41-0596-4D38-9891-D1DF711EA7E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1A901C6-FB73-4361-B391-4A4AF8C70029\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7550p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C5D7E2C-0955-4B6E-96E4-CFA06D937492\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7550p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1D0F33-AD5A-4826-9A06-EAD2A8709974\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"094197AC-0D25-480F-B797-06AC9842CD5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC736A-FEB8-49B3-8500-DB3339906C77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7635p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A72DAA5-E10F-40A0-A8CC-541594A3279F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7635p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15CC657A-7623-4F37-AC52-8AF5C83D5BDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012C20A8-3F48-48DD-9A77-65C9CB1F6C30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE992A86-36BC-40E3-8E96-6542560BE8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B46F132-4049-40D0-8351-C1C6FD2B47A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1846514C-1F95-4568-98DE-C57214401841\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65865EE9-59C0-498F-A4C5-EC00D4642603\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE02AB51-6FB6-4727-999B-A7466CEDC534\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F63D90-4BFC-4EFA-8B74-7A5027A7052D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EB529B-6B9F-464F-A98B-A8ABE0F01ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167C1CC1-03F8-49B3-B460-FCA38644DA06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D2E820B-1273-4E82-9D45-A4159AF3878C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84641A8E-A93C-48C1-86AC-193951BA4D78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74169A4C-0247-4719-887E-BBFB36B04F07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685D81D0-7E95-4DBA-A05B-7C708A5DFDF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB3BC1B-2EBC-457C-AE91-6BD408EB7D5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_6_gen_1_mobile_platform:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870CC30-07F8-4FFF-85B4-FBACE947CC14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1295D869-F4DD-4766-B4AA-3513752F43B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98784DC-3143-4D38-AD28-DBBDCCAB4272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2503805B-B2A6-4AEE-8AB1-2B8A040702BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3AD370C-2ED0-43CF-83D9-50DC92A01CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34143ABA-7D09-429F-A65C-3A33438BF62C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28A12D6-CC60-4BE9-ADEE-FAB58B05440F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92B17201-8185-47F1-9720-5AB4ECD11B22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FA2EB9-416F-4D69-8786-386CC73978AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896F1C04-9957-440F-BF01-C3772CC3B3DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90555EB-47A7-4717-92D5-35B561825F06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699056F6-1517-4F25-AE07-4FFCF6923B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C023D2-6FF5-4FFC-B9F2-895979166580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BFB25F-013B-48E3-99FF-3E8687F94423\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF676C5B-838B-446C-A689-6A25AB8A87E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93398092-AF7C-4F04-874C-7E5B4CF7AB00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D242084-5844-4E43-8D7F-D2F8E3521F0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC386D9-3D2B-40FA-A2D9-199BB138F46A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133FFD9F-FA09-4801-939B-AD1D507BE5FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEA0D7B-F3F7-4A6F-B222-192412FEECD3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB8794F-7998-424E-AF68-E4A4F9310F65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"799D69CE-3FCC-4B19-8B00-9AF38111D983\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57608D47-894C-4895-B4B3-4733D55D57DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FFD2C38-1A61-4BED-ABFA-DAE0C4B78620\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63735D33-9F09-4841-9FE0-0D9AB604BECF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E826F765-4C2E-4319-BBC4-DEB02AAD783F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D765C392-5F38-4E6A-9E88-59629E7A6911\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE8F4F9-F692-4EC0-A3FE-2CDD681DCBFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15307882-7039-43E9-9BA3-035045988B99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA85B322-E593-4499-829A-CC6D70BAE884\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E839A0B9-64C3-4C7A-82B7-D2AAF65928F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E870D82-DE3B-4199-A730-C8FB545BAA98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B69595-E488-4590-A150-CE5BE08B5E13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF680174-5FA6-47D9-8EAB-CC2A37A7BD42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACAD26E-B79E-4659-91A5-D301281F7D36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80BC68E-7476-4A40-9F48-53722FE9A5BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B36F4B2-BAA3-45AD-9967-0EB482C99708\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA33DE15-C177-43B3-AD50-FF797753D12E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1A5841-5BCB-4033-ACB9-23F3FCA65309\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B47BF35-3AA0-4667-842E-19B0FE30BF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A071672-9405-4418-9141-35CEADBB65AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7CF473-8B25-4851-91F2-1BD693CCDC85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E591F2-8F72-4A5A-9264-2742EB2DABDA\"}]}]}],\"references\":[{\"url\":\"https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-47317\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-24T20:13:04.944210Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-24T20:13:10.506Z\"}}], \"cna\": {\"title\": \"Buffer Over-read in BT Controller\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Qualcomm, Inc.\", \"product\": \"Snapdragon\", \"versions\": [{\"status\": \"affected\", \"version\": \"FastConnect 6200\"}, {\"status\": \"affected\", \"version\": \"FastConnect 6700\"}, {\"status\": \"affected\", \"version\": \"FastConnect 7800\"}, {\"status\": \"affected\", \"version\": \"QCC5161\"}, {\"status\": \"affected\", \"version\": \"QCC710\"}, {\"status\": \"affected\", \"version\": \"QCC711\"}, {\"status\": \"affected\", \"version\": \"QCC7225\"}, {\"status\": \"affected\", \"version\": \"QCC7226\"}, {\"status\": \"affected\", \"version\": \"QCC7228\"}, {\"status\": \"affected\", \"version\": \"QMP1000\"}, {\"status\": \"affected\", \"version\": \"S3 Gen 2 Sound Platform\"}, {\"status\": \"affected\", \"version\": \"S3 Sound Platform\"}, {\"status\": \"affected\", \"version\": \"S5 Gen 2 Sound Platform\"}, {\"status\": \"affected\", \"version\": \"S5 Sound Platform\"}, {\"status\": \"affected\", \"version\": \"SM6475\"}, {\"status\": \"affected\", \"version\": \"SM6650\"}, {\"status\": \"affected\", \"version\": \"SM6650P\"}, {\"status\": \"affected\", \"version\": \"SM7435\"}, {\"status\": \"affected\", \"version\": \"SM7550\"}, {\"status\": \"affected\", \"version\": \"SM7550P\"}, {\"status\": \"affected\", \"version\": \"SM7635\"}, {\"status\": \"affected\", \"version\": \"SM7635P\"}, {\"status\": \"affected\", \"version\": \"SM7675\"}, {\"status\": \"affected\", \"version\": \"SM7675P\"}, {\"status\": \"affected\", \"version\": \"SM8635\"}, {\"status\": \"affected\", \"version\": \"SM8635P\"}, {\"status\": \"affected\", \"version\": \"SM8735\"}, {\"status\": \"affected\", \"version\": \"SM8750\"}, {\"status\": \"affected\", \"version\": \"SM8750P\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 6 Gen 1 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"WCD9370\"}, {\"status\": \"affected\", \"version\": \"WCD9371\"}, {\"status\": \"affected\", \"version\": \"WCD9375\"}, {\"status\": \"affected\", \"version\": \"WCD9378\"}, {\"status\": \"affected\", \"version\": \"WCD9385\"}, {\"status\": \"affected\", \"version\": \"WCD9390\"}, {\"status\": \"affected\", \"version\": \"WCD9395\"}, {\"status\": \"affected\", \"version\": \"WCN3988\"}, {\"status\": \"affected\", \"version\": \"WCN6650\"}, {\"status\": \"affected\", \"version\": \"WCN6755\"}, {\"status\": \"affected\", \"version\": \"WCN7750\"}, {\"status\": \"affected\", \"version\": \"WCN7860\"}, {\"status\": \"affected\", \"version\": \"WCN7861\"}, {\"status\": \"affected\", \"version\": \"WCN7880\"}, {\"status\": \"affected\", \"version\": \"WCN7881\"}, {\"status\": \"affected\", \"version\": \"WSA8810\"}, {\"status\": \"affected\", \"version\": \"WSA8815\"}, {\"status\": \"affected\", \"version\": \"WSA8830\"}, {\"status\": \"affected\", \"version\": \"WSA8832\"}, {\"status\": \"affected\", \"version\": \"WSA8835\"}, {\"status\": \"affected\", \"version\": \"WSA8840\"}, {\"status\": \"affected\", \"version\": \"WSA8845\"}, {\"status\": \"affected\", \"version\": \"WSA8845H\"}], \"platforms\": [\"Snapdragon CCW\", \"Snapdragon Consumer IOT\", \"Snapdragon Industrial IOT\", \"Snapdragon MC\", \"Snapdragon Mobile\", \"Snapdragon Voice \u0026 Music\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Memory corruption due to global buffer overflow when a test command uses an invalid payload type.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-126\", \"description\": \"CWE-126 Buffer Over-read\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"shortName\": \"qualcomm\", \"dateUpdated\": \"2025-09-24T15:33:49.869Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-47317\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-25T03:55:41.891Z\", \"dateReserved\": \"2025-05-06T08:33:16.260Z\", \"assignerOrgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"datePublished\": \"2025-09-24T15:33:49.869Z\", \"assignerShortName\": \"qualcomm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
NCSC-2025-0273
Vulnerability from csaf_ncscnl - Published: 2025-09-04 08:15 - Updated: 2025-09-04 08:15{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.\n\nNaast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.\n\nGoogle meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.\n\nZie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Value Delimiters",
"title": "CWE-142"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09"
},
{
"category": "external",
"summary": "Reference",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-09-04T08:15:14.806733Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0273",
"initial_release_date": "2025-09-04T08:15:14.806733Z",
"revision_history": [
{
"date": "2025-09-04T08:15:14.806733Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13 \u003c2025-09-05",
"product": {
"name": "vers:unknown/13 \u003c2025-09-05",
"product_id": "CSAFPID-3094337"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14 \u003c2025-09-05",
"product": {
"name": "vers:unknown/14 \u003c2025-09-05",
"product_id": "CSAFPID-3094338"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/15 \u003c2025-09-05",
"product": {
"name": "vers:unknown/15 \u003c2025-09-05",
"product_id": "CSAFPID-3094335"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/16 \u003c2025-09-05",
"product": {
"name": "vers:unknown/16 \u003c2025-09-05",
"product_id": "CSAFPID-3094336"
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16",
"product_id": "CSAFPID-3094178"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid14|15",
"product_id": "CSAFPID-3094177"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinandroid15|16",
"product_id": "CSAFPID-3094180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product": {
"name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16",
"product_id": "CSAFPID-3094179"
}
}
],
"category": "product_name",
"name": "Samsung Mobile Devices"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39810 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-39810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24023 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-24023.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-7881",
"cwe": {
"id": "CWE-1422",
"name": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"title": "CWE-1422"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2024-47898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47898 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47898.json"
}
],
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47899 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47899.json"
}
],
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49714.json"
}
],
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0076 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0076.json"
}
],
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0089 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0089.json"
}
],
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-0467",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0467 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1706.json"
}
],
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3212 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3212.json"
}
],
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-8109",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8109 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8109.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2025-20696",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20696.json"
}
],
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20703.json"
}
],
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20704.json"
}
],
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20708.json"
}
],
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21025",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21025 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21025"
},
{
"cve": "CVE-2025-21026",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21026 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21026.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21026"
},
{
"cve": "CVE-2025-21027",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21027 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21027"
},
{
"cve": "CVE-2025-21028",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21028 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21028"
},
{
"cve": "CVE-2025-21029",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21029 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21029.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21029"
},
{
"cve": "CVE-2025-21030",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21030 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21030"
},
{
"cve": "CVE-2025-21031",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21031 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21031"
},
{
"cve": "CVE-2025-21032",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21032"
},
{
"cve": "CVE-2025-21033",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21033 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21033"
},
{
"cve": "CVE-2025-21034",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21034.json"
}
],
"title": "CVE-2025-21034"
},
{
"cve": "CVE-2025-21427",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21427.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21432.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21433.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21449.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21477 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21481.json"
}
],
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21482 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21482.json"
}
],
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21483 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21483.json"
}
],
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21484 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21484.json"
}
],
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21487.json"
}
],
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21488 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21488.json"
}
],
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21755.json"
}
],
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25179 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25179.json"
}
],
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25180 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25180.json"
}
],
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26454.json"
}
],
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26464.json"
}
],
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27032.json"
}
],
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27034 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27034.json"
}
],
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27042 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27042.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27056 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27061 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27073 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32321.json"
}
],
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32323 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32323.json"
}
],
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32324 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32324.json"
}
],
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32325.json"
}
],
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32326.json"
}
],
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32327.json"
}
],
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32330.json"
}
],
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32331.json"
}
],
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32332.json"
}
],
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32333.json"
}
],
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32345 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32345.json"
}
],
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32346.json"
}
],
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32347.json"
}
],
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32349.json"
}
],
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32350.json"
}
],
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38352 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38352.json"
}
],
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
}
],
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46708.json"
}
],
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46710.json"
}
],
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47317.json"
}
],
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47318.json"
}
],
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47326.json"
}
],
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47328.json"
}
],
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47329.json"
}
],
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48522 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48522.json"
}
],
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48523 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48523.json"
}
],
"title": "CVE-2025-48523"
},
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48524.json"
}
],
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48526 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48526.json"
}
],
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48527.json"
}
],
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48528 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48528.json"
}
],
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48529 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48529.json"
}
],
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48531 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48531.json"
}
],
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48532 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48532.json"
}
],
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48534.json"
}
],
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48535 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48535.json"
}
],
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48537 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48537.json"
}
],
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48538.json"
}
],
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48539 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48539.json"
}
],
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48540 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48540.json"
}
],
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48541 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48541.json"
}
],
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48542 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48542.json"
}
],
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48543 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48543.json"
}
],
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48544 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48544.json"
}
],
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48545 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48545.json"
}
],
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48546 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48546.json"
}
],
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48547.json"
}
],
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48548 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48548.json"
}
],
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48549 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48549.json"
}
],
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48550.json"
}
],
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48551.json"
}
],
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48552.json"
}
],
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48553.json"
}
],
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48554.json"
}
],
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48556.json"
}
],
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48558 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48558.json"
}
],
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48559.json"
}
],
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48560 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48560.json"
}
],
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48561.json"
}
],
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48562 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48562.json"
}
],
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48563 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48563.json"
}
],
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"CSAFPID-3094337",
"CSAFPID-3094338",
"CSAFPID-3094335",
"CSAFPID-3094336",
"CSAFPID-3094178",
"CSAFPID-3094177",
"CSAFPID-3094180",
"CSAFPID-3094179"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48581 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48581.json"
}
],
"title": "CVE-2025-48581"
}
]
}
WID-SEC-W-2025-1944
Vulnerability from csaf_certbund - Published: 2025-09-02 22:00 - Updated: 2025-09-08 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1944 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1944.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1944 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1944"
},
{
"category": "external",
"summary": "Sicherheitsbulletin f\u00fcr Android \u2013 September 2025 vom 2025-09-02",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01"
}
],
"source_lang": "en-US",
"title": "Android Patchday September 2025: Multiple Vulnerabilities",
"tracking": {
"current_release_date": "2025-09-08T22:00:00.000+00:00",
"generator": {
"date": "2025-09-09T07:41:17.056+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1944",
"initial_release_date": "2025-09-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-26818, EUVD-2025-26819, EUVD-2025-26822, EUVD-2025-26823, EUVD-2025-26824, EUVD-2025-26825, EUVD-2025-26826, EUVD-2025-26828, EUVD-2025-26829, EUVD-2025-26830, EUVD-2025-26831, EUVD-2025-26834, EUVD-2025-26835, EUVD-2025-26836, EUVD-2025-26837, EUVD-2025-26796, EUVD-2025-26804, EUVD-2025-26805, EUVD-2025-26806, EUVD-2025-26807, EUVD-2025-26808, EUVD-2025-26811, EUVD-2025-26814, EUVD-2025-26815, EUVD-2025-26816, EUVD-2025-26827, EUVD-2025-26832, EUVD-2025-26795, EUVD-2025-26833, EUVD-2025-26803, EUVD-2025-26809, EUVD-2025-26799, EUVD-2025-26800, EUVD-2025-26810, EUVD-2025-26812, EUVD-2025-26813, EUVD-2025-26817, EUVD-2025-26791, EUVD-2025-26797, EUVD-2025-26798, EUVD-2025-26801, EUVD-2025-26802, EUVD-2024-54966, EUVD-2025-26792, EUVD-2025-26793, EUVD-2025-26794, EUVD-2025-26838, EUVD-2025-26839, EUVD-2025-26840, EUVD-2025-26841, EUVD-2025-26842, EUVD-2025-26843, EUVD-2025-26844, EUVD-2025-26845, EUVD-2025-26846, EUVD-2025-26820, EUVD-2025-26821"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2025-27124"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "13 \u003c2025-09-05",
"product": {
"name": "Google Android 13 \u003c2025-09-05",
"product_id": "T046664"
}
},
{
"category": "product_version",
"name": "13 2025-09-05",
"product": {
"name": "Google Android 13 2025-09-05",
"product_id": "T046664-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:13__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "14 \u003c2025-09-05",
"product": {
"name": "Google Android 14 \u003c2025-09-05",
"product_id": "T046665"
}
},
{
"category": "product_version",
"name": "14 2025-09-05",
"product": {
"name": "Google Android 14 2025-09-05",
"product_id": "T046665-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:14__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003c2025-09-05",
"product": {
"name": "Google Android 15 \u003c2025-09-05",
"product_id": "T046666"
}
},
{
"category": "product_version",
"name": "15 2025-09-05",
"product": {
"name": "Google Android 15 2025-09-05",
"product_id": "T046666-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:15__2025-09-05"
}
}
},
{
"category": "product_version_range",
"name": "16 \u003c2025-09-05",
"product": {
"name": "Google Android 16 \u003c2025-09-05",
"product_id": "T046667"
}
},
{
"category": "product_version",
"name": "16 2025-09-05",
"product": {
"name": "Google Android 16 2025-09-05",
"product_id": "T046667-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:16__2025-09-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-48524",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48524"
},
{
"cve": "CVE-2025-48526",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48526"
},
{
"cve": "CVE-2025-48527",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48527"
},
{
"cve": "CVE-2025-48528",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48528"
},
{
"cve": "CVE-2025-48529",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48529"
},
{
"cve": "CVE-2025-48531",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48531"
},
{
"cve": "CVE-2025-48532",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48532"
},
{
"cve": "CVE-2025-48534",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48534"
},
{
"cve": "CVE-2025-48535",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48535"
},
{
"cve": "CVE-2025-48537",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48537"
},
{
"cve": "CVE-2025-48538",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48538"
},
{
"cve": "CVE-2025-48539",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48539"
},
{
"cve": "CVE-2025-48540",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48540"
},
{
"cve": "CVE-2025-48541",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48541"
},
{
"cve": "CVE-2025-48542",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48542"
},
{
"cve": "CVE-2025-48543",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48543"
},
{
"cve": "CVE-2025-48544",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48544"
},
{
"cve": "CVE-2025-48545",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48545"
},
{
"cve": "CVE-2025-48546",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48546"
},
{
"cve": "CVE-2025-48547",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48547"
},
{
"cve": "CVE-2025-48548",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48548"
},
{
"cve": "CVE-2025-48549",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48549"
},
{
"cve": "CVE-2025-48550",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48550"
},
{
"cve": "CVE-2025-48551",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48551"
},
{
"cve": "CVE-2025-48552",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48552"
},
{
"cve": "CVE-2025-48553",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48553"
},
{
"cve": "CVE-2025-48554",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48554"
},
{
"cve": "CVE-2025-48556",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48556"
},
{
"cve": "CVE-2025-48558",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48558"
},
{
"cve": "CVE-2025-48559",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48559"
},
{
"cve": "CVE-2025-48560",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48560"
},
{
"cve": "CVE-2025-48561",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48561"
},
{
"cve": "CVE-2025-48562",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48562"
},
{
"cve": "CVE-2025-48563",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48563"
},
{
"cve": "CVE-2025-48581",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48581"
},
{
"cve": "CVE-2025-8109",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-8109"
},
{
"cve": "CVE-2021-39810",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2021-39810"
},
{
"cve": "CVE-2023-24023",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2024-47898",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-47898"
},
{
"cve": "CVE-2024-47899",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-47899"
},
{
"cve": "CVE-2024-49714",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-49714"
},
{
"cve": "CVE-2024-7881",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2024-7881"
},
{
"cve": "CVE-2025-0076",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0076"
},
{
"cve": "CVE-2025-0089",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0089"
},
{
"cve": "CVE-2025-021701",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-021701"
},
{
"cve": "CVE-2025-0467",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-0467"
},
{
"cve": "CVE-2025-1246",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-1246"
},
{
"cve": "CVE-2025-1706",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-1706"
},
{
"cve": "CVE-2025-20696",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20696"
},
{
"cve": "CVE-2025-20703",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20703"
},
{
"cve": "CVE-2025-20704",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20704"
},
{
"cve": "CVE-2025-20708",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-20708"
},
{
"cve": "CVE-2025-21427",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21427"
},
{
"cve": "CVE-2025-21432",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21432"
},
{
"cve": "CVE-2025-21433",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21433"
},
{
"cve": "CVE-2025-21446",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21446"
},
{
"cve": "CVE-2025-21449",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21449"
},
{
"cve": "CVE-2025-21450",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21450"
},
{
"cve": "CVE-2025-21454",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21454"
},
{
"cve": "CVE-2025-21464",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21464"
},
{
"cve": "CVE-2025-21465",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21465"
},
{
"cve": "CVE-2025-21477",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21477"
},
{
"cve": "CVE-2025-21481",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21481"
},
{
"cve": "CVE-2025-21482",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21482"
},
{
"cve": "CVE-2025-21483",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21483"
},
{
"cve": "CVE-2025-21484",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21484"
},
{
"cve": "CVE-2025-21487",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21487"
},
{
"cve": "CVE-2025-21488",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21488"
},
{
"cve": "CVE-2025-21755",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-21755"
},
{
"cve": "CVE-2025-25179",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-25179"
},
{
"cve": "CVE-2025-25180",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-25180"
},
{
"cve": "CVE-2025-26454",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-26454"
},
{
"cve": "CVE-2025-26464",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-26464"
},
{
"cve": "CVE-2025-27032",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27032"
},
{
"cve": "CVE-2025-27034",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27034"
},
{
"cve": "CVE-2025-27042",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27042"
},
{
"cve": "CVE-2025-27043",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27043"
},
{
"cve": "CVE-2025-27052",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27052"
},
{
"cve": "CVE-2025-27056",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27056"
},
{
"cve": "CVE-2025-27057",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27057"
},
{
"cve": "CVE-2025-27061",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27061"
},
{
"cve": "CVE-2025-27065",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27065"
},
{
"cve": "CVE-2025-27066",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27066"
},
{
"cve": "CVE-2025-27073",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-27073"
},
{
"cve": "CVE-2025-3212",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-3212"
},
{
"cve": "CVE-2025-32321",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32321"
},
{
"cve": "CVE-2025-32323",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32323"
},
{
"cve": "CVE-2025-32324",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32324"
},
{
"cve": "CVE-2025-32325",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32325"
},
{
"cve": "CVE-2025-32326",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32326"
},
{
"cve": "CVE-2025-32327",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32327"
},
{
"cve": "CVE-2025-32330",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32330"
},
{
"cve": "CVE-2025-32331",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32331"
},
{
"cve": "CVE-2025-32332",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32332"
},
{
"cve": "CVE-2025-32333",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32333"
},
{
"cve": "CVE-2025-32345",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32345"
},
{
"cve": "CVE-2025-32346",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32346"
},
{
"cve": "CVE-2025-32347",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32347"
},
{
"cve": "CVE-2025-32349",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32349"
},
{
"cve": "CVE-2025-32350",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-32350"
},
{
"cve": "CVE-2025-38352",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-38352"
},
{
"cve": "CVE-2025-46707",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46707"
},
{
"cve": "CVE-2025-46708",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46708"
},
{
"cve": "CVE-2025-46710",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-46710"
},
{
"cve": "CVE-2025-47317",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47317"
},
{
"cve": "CVE-2025-47318",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47318"
},
{
"cve": "CVE-2025-47326",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47326"
},
{
"cve": "CVE-2025-47328",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47328"
},
{
"cve": "CVE-2025-47329",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-47329"
},
{
"cve": "CVE-2025-48522",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48522"
},
{
"cve": "CVE-2025-48523",
"product_status": {
"known_affected": [
"T046666",
"T046667",
"T046664",
"T046665"
]
},
"release_date": "2025-09-02T22:00:00.000+00:00",
"title": "CVE-2025-48523"
}
]
}
FKIE_CVE-2025-47317
Vulnerability from fkie_nvd - Published: 2025-09-24 16:15 - Updated: 2025-09-25 16:04| Vendor | Product | Version | |
|---|---|---|---|
| qualcomm | fastconnect_6200_firmware | - | |
| qualcomm | fastconnect_6200 | - | |
| qualcomm | fastconnect_6700_firmware | - | |
| qualcomm | fastconnect_6700 | - | |
| qualcomm | fastconnect_7800_firmware | - | |
| qualcomm | fastconnect_7800 | - | |
| qualcomm | qcc5161_firmware | - | |
| qualcomm | qcc5161 | - | |
| qualcomm | qcc710_firmware | - | |
| qualcomm | qcc710 | - | |
| qualcomm | qcc711_firmware | - | |
| qualcomm | qcc711 | - | |
| qualcomm | qcc7225_firmware | - | |
| qualcomm | qcc7225 | - | |
| qualcomm | qcc7226_firmware | - | |
| qualcomm | qcc7226 | - | |
| qualcomm | qcc7228_firmware | - | |
| qualcomm | qcc7228 | - | |
| qualcomm | qmp1000_firmware | - | |
| qualcomm | qmp1000 | - | |
| qualcomm | s3_gen_2_sound_platform_firmware | - | |
| qualcomm | s3_gen_2_sound_platform | - | |
| qualcomm | s3_sound_platform_firmware | - | |
| qualcomm | s3_sound_platform | - | |
| qualcomm | s5_gen_2_sound_platform_firmware | - | |
| qualcomm | s5_gen_2_sound_platform | - | |
| qualcomm | s5_sound_platform_firmware | - | |
| qualcomm | s5_sound_platform | - | |
| qualcomm | sm6475_firmware | - | |
| qualcomm | sm6475 | - | |
| qualcomm | sm6650_firmware | - | |
| qualcomm | sm6650 | - | |
| qualcomm | sm6650p_firmware | - | |
| qualcomm | sm6650p | - | |
| qualcomm | sm7435_firmware | - | |
| qualcomm | sm7435 | - | |
| qualcomm | sm7550_firmware | - | |
| qualcomm | sm7550 | - | |
| qualcomm | sm7550p_firmware | - | |
| qualcomm | sm7550p | - | |
| qualcomm | sm7635_firmware | - | |
| qualcomm | sm7635 | - | |
| qualcomm | sm7635p_firmware | - | |
| qualcomm | sm7635p | - | |
| qualcomm | sm7675_firmware | - | |
| qualcomm | sm7675 | - | |
| qualcomm | sm7675p_firmware | - | |
| qualcomm | sm7675p | - | |
| qualcomm | sm8635_firmware | - | |
| qualcomm | sm8635 | - | |
| qualcomm | sm8635p_firmware | - | |
| qualcomm | sm8635p | - | |
| qualcomm | sm8735_firmware | - | |
| qualcomm | sm8735 | - | |
| qualcomm | sm8750_firmware | - | |
| qualcomm | sm8750 | - | |
| qualcomm | sm8750p_firmware | - | |
| qualcomm | sm8750p | - | |
| qualcomm | snapdragon_6_gen_1_mobile_platform_firmware | - | |
| qualcomm | snapdragon_6_gen_1_mobile_platform | - | |
| qualcomm | wcd9370_firmware | - | |
| qualcomm | wcd9370 | - | |
| qualcomm | wcd9371_firmware | - | |
| qualcomm | wcd9371 | - | |
| qualcomm | wcd9375_firmware | - | |
| qualcomm | wcd9375 | - | |
| qualcomm | wcd9378_firmware | - | |
| qualcomm | wcd9378 | - | |
| qualcomm | wcd9385_firmware | - | |
| qualcomm | wcd9385 | - | |
| qualcomm | wcd9390_firmware | - | |
| qualcomm | wcd9390 | - | |
| qualcomm | wcd9395_firmware | - | |
| qualcomm | wcd9395 | - | |
| qualcomm | wcn3988_firmware | - | |
| qualcomm | wcn3988 | - | |
| qualcomm | wcn6650_firmware | - | |
| qualcomm | wcn6650 | - | |
| qualcomm | wcn6755_firmware | - | |
| qualcomm | wcn6755 | - | |
| qualcomm | wcn7750_firmware | - | |
| qualcomm | wcn7750 | - | |
| qualcomm | wcn7860_firmware | - | |
| qualcomm | wcn7860 | - | |
| qualcomm | wcn7861_firmware | - | |
| qualcomm | wcn7861 | - | |
| qualcomm | wcn7880_firmware | - | |
| qualcomm | wcn7880 | - | |
| qualcomm | wcn7881_firmware | - | |
| qualcomm | wcn7881 | - | |
| qualcomm | wsa8810_firmware | - | |
| qualcomm | wsa8810 | - | |
| qualcomm | wsa8815_firmware | - | |
| qualcomm | wsa8815 | - | |
| qualcomm | wsa8830_firmware | - | |
| qualcomm | wsa8830 | - | |
| qualcomm | wsa8832_firmware | - | |
| qualcomm | wsa8832 | - | |
| qualcomm | wsa8835_firmware | - | |
| qualcomm | wsa8835 | - | |
| qualcomm | wsa8840_firmware | - | |
| qualcomm | wsa8840 | - | |
| qualcomm | wsa8845_firmware | - | |
| qualcomm | wsa8845 | - | |
| qualcomm | wsa8845h_firmware | - | |
| qualcomm | wsa8845h | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc5161_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E46C3967-D2BE-424F-95B8-A3689677AE57",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc5161:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73C21D3B-E8E4-4384-9F80-B448A90AB1EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc711_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A20DED6B-1CEF-4FC8-A6C9-176E34322D5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc711:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F9CA40D-1164-4A00-A722-EC1FBE839705",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc7225_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7553D09E-E6F3-46C4-9FE0-750CFB7D0CA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc7225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBACEC44-6028-438A-8375-8EEBAD3B16C8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc7226_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF65E4DE-F031-4611-A9F8-80E633B50F70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc7226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B3DDE7-D13F-4DE3-B2DD-986B0BF07C7E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc7228_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96822D1A-40C7-4FF8-B00D-1FE59B21FB8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc7228:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B4D966B-7F0B-46A2-9967-75231F15B113",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1CF44E-FFC2-4DCB-8DC2-46422D912448",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:s3_gen_2_sound_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8170481D-548A-4D15-A083-48FE1901F0C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:s3_gen_2_sound_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "898088E3-56FD-4E5A-A26C-4FC073475BC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:s3_sound_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D506D526-9141-45EB-BB2F-07ED3696AF90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:s3_sound_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37B3BAEA-4432-4081-A450-B6F02A65FAF5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:s5_gen_2_sound_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F7C9DF-2C1C-454D-9A4A-1953ACA05FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:s5_gen_2_sound_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF12649-B9DC-49A1-BD2A-C298B33B3F87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:s5_sound_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD2CF5B-DAD6-49FB-9919-C4336733A6A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:s5_sound_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05153F92-EC0E-4FD1-95FF-DCD1BB4D868A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm6475_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B685E79-9C6B-4A60-9176-D55358163800",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm6475:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14BD7F1F-4582-4CA9-95AD-F420E7F2BED4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39296E3C-4E0F-4B90-A3C0-CA9C9F74CBB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm6650p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09020F3F-C869-42DF-BD9C-E78056CC8123",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm6650p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8272228-2D68-45F2-A670-B5D6E90D9C14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A95A9E-617A-4D3A-9A4E-0C0A29B3C8B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3559292E-B5A6-4F88-BC20-F6AA85F07C97",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA5CE41-0596-4D38-9891-D1DF711EA7E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A901C6-FB73-4361-B391-4A4AF8C70029",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7550p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5D7E2C-0955-4B6E-96E4-CFA06D937492",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7550p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D1D0F33-AD5A-4826-9A06-EAD2A8709974",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40AC736A-FEB8-49B3-8500-DB3339906C77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7635p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A72DAA5-E10F-40A0-A8CC-541594A3279F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7635p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15CC657A-7623-4F37-AC52-8AF5C83D5BDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE992A86-36BC-40E3-8E96-6542560BE8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1846514C-1F95-4568-98DE-C57214401841",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE02AB51-6FB6-4727-999B-A7466CEDC534",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20EB529B-6B9F-464F-A98B-A8ABE0F01ADB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D2E820B-1273-4E82-9D45-A4159AF3878C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74169A4C-0247-4719-887E-BBFB36B04F07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685D81D0-7E95-4DBA-A05B-7C708A5DFDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB3BC1B-2EBC-457C-AE91-6BD408EB7D5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_6_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0870CC30-07F8-4FFF-85B4-FBACE947CC14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A12D6-CC60-4BE9-ADEE-FAB58B05440F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D242084-5844-4E43-8D7F-D2F8E3521F0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEA0D7B-F3F7-4A6F-B222-192412FEECD3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "799D69CE-3FCC-4B19-8B00-9AF38111D983",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FFD2C38-1A61-4BED-ABFA-DAE0C4B78620",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E826F765-4C2E-4319-BBC4-DEB02AAD783F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE8F4F9-F692-4EC0-A3FE-2CDD681DCBFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption due to global buffer overflow when a test command uses an invalid payload type."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria debido a desbordamiento de b\u00fafer global cuando un comando de prueba usa un tipo de carga \u00fatil inv\u00e1lido."
}
],
"id": "CVE-2025-47317",
"lastModified": "2025-09-25T16:04:08.330",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "product-security@qualcomm.com",
"type": "Secondary"
}
]
},
"published": "2025-09-24T16:15:36.920",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-126"
}
],
"source": "product-security@qualcomm.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0750
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que les vulnérabilités CVE-2025-38352 et CVE-2025-48543 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14, 15 et 16 avant le correctif du 2 septembre 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-48534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48534"
},
{
"name": "CVE-2025-47326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47326"
},
{
"name": "CVE-2025-48531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48531"
},
{
"name": "CVE-2025-32323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32323"
},
{
"name": "CVE-2025-21487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21487"
},
{
"name": "CVE-2025-48544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48544"
},
{
"name": "CVE-2025-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27065"
},
{
"name": "CVE-2025-48541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48541"
},
{
"name": "CVE-2025-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3212"
},
{
"name": "CVE-2025-47328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47328"
},
{
"name": "CVE-2025-21433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21433"
},
{
"name": "CVE-2025-27034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27034"
},
{
"name": "CVE-2025-8109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8109"
},
{
"name": "CVE-2025-21481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21481"
},
{
"name": "CVE-2025-48535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48535"
},
{
"name": "CVE-2025-48527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48527"
},
{
"name": "CVE-2025-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27032"
},
{
"name": "CVE-2025-48539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48539"
},
{
"name": "CVE-2025-48540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48540"
},
{
"name": "CVE-2025-47317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47317"
},
{
"name": "CVE-2025-32333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32333"
},
{
"name": "CVE-2025-21465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21465"
},
{
"name": "CVE-2025-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25180"
},
{
"name": "CVE-2025-48563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48563"
},
{
"name": "CVE-2025-48526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48526"
},
{
"name": "CVE-2025-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27052"
},
{
"name": "CVE-2025-48538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48538"
},
{
"name": "CVE-2025-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20703"
},
{
"name": "CVE-2025-21482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21482"
},
{
"name": "CVE-2025-21755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
},
{
"name": "CVE-2024-7881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7881"
},
{
"name": "CVE-2025-48556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48556"
},
{
"name": "CVE-2025-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27043"
},
{
"name": "CVE-2025-21464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21464"
},
{
"name": "CVE-2025-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20696"
},
{
"name": "CVE-2025-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21449"
},
{
"name": "CVE-2025-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0076"
},
{
"name": "CVE-2025-1246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1246"
},
{
"name": "CVE-2025-26454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26454"
},
{
"name": "CVE-2025-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21427"
},
{
"name": "CVE-2025-32347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32347"
},
{
"name": "CVE-2025-47329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47329"
},
{
"name": "CVE-2025-21483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21483"
},
{
"name": "CVE-2025-21446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21446"
},
{
"name": "CVE-2025-32325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32325"
},
{
"name": "CVE-2025-25179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25179"
},
{
"name": "CVE-2021-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39810"
},
{
"name": "CVE-2025-48528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48528"
},
{
"name": "CVE-2025-32349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32349"
},
{
"name": "CVE-2025-32345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32345"
},
{
"name": "CVE-2025-48524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48524"
},
{
"name": "CVE-2025-21432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21432"
},
{
"name": "CVE-2025-48542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48542"
},
{
"name": "CVE-2025-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48522"
},
{
"name": "CVE-2025-32331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32331"
},
{
"name": "CVE-2025-48546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48546"
},
{
"name": "CVE-2025-48581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48581"
},
{
"name": "CVE-2025-48551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48551"
},
{
"name": "CVE-2025-27061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27061"
},
{
"name": "CVE-2024-49714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49714"
},
{
"name": "CVE-2025-48547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48547"
},
{
"name": "CVE-2025-48537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48537"
},
{
"name": "CVE-2025-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0467"
},
{
"name": "CVE-2025-46708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46708"
},
{
"name": "CVE-2025-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47318"
},
{
"name": "CVE-2025-21450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21450"
},
{
"name": "CVE-2025-48550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48550"
},
{
"name": "CVE-2025-021701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-021701"
},
{
"name": "CVE-2025-48561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48561"
},
{
"name": "CVE-2025-48553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48553"
},
{
"name": "CVE-2025-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27042"
},
{
"name": "CVE-2025-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48554"
},
{
"name": "CVE-2025-48549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48549"
},
{
"name": "CVE-2025-21477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21477"
},
{
"name": "CVE-2025-48529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48529"
},
{
"name": "CVE-2025-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46710"
},
{
"name": "CVE-2025-32327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32327"
},
{
"name": "CVE-2024-47899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47899"
},
{
"name": "CVE-2025-32332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32332"
},
{
"name": "CVE-2025-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48560"
},
{
"name": "CVE-2025-48559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48559"
},
{
"name": "CVE-2025-1706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1706"
},
{
"name": "CVE-2025-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0089"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2025-32330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32330"
},
{
"name": "CVE-2025-32326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32326"
},
{
"name": "CVE-2025-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27056"
},
{
"name": "CVE-2025-21488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21488"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32324"
},
{
"name": "CVE-2025-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27057"
},
{
"name": "CVE-2025-48532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48532"
},
{
"name": "CVE-2025-27066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27066"
},
{
"name": "CVE-2025-48552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48552"
},
{
"name": "CVE-2024-47898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47898"
},
{
"name": "CVE-2025-48545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48545"
},
{
"name": "CVE-2025-27073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27073"
},
{
"name": "CVE-2025-32350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32350"
},
{
"name": "CVE-2025-21484",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21484"
},
{
"name": "CVE-2025-48523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48523"
},
{
"name": "CVE-2025-48543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48543"
},
{
"name": "CVE-2025-48562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48562"
},
{
"name": "CVE-2025-32321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32321"
},
{
"name": "CVE-2025-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26464"
},
{
"name": "CVE-2025-32346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32346"
},
{
"name": "CVE-2025-20704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20704"
},
{
"name": "CVE-2025-48548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48548"
},
{
"name": "CVE-2025-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21454"
},
{
"name": "CVE-2025-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46707"
},
{
"name": "CVE-2025-20708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20708"
},
{
"name": "CVE-2025-48558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48558"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0750",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que les vuln\u00e9rabilit\u00e9s CVE-2025-38352 et CVE-2025-48543 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01?hl=fr"
}
]
}
CERTFR-2025-AVI-0750
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que les vulnérabilités CVE-2025-38352 et CVE-2025-48543 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14, 15 et 16 avant le correctif du 2 septembre 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-48534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48534"
},
{
"name": "CVE-2025-47326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47326"
},
{
"name": "CVE-2025-48531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48531"
},
{
"name": "CVE-2025-32323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32323"
},
{
"name": "CVE-2025-21487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21487"
},
{
"name": "CVE-2025-48544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48544"
},
{
"name": "CVE-2025-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27065"
},
{
"name": "CVE-2025-48541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48541"
},
{
"name": "CVE-2025-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3212"
},
{
"name": "CVE-2025-47328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47328"
},
{
"name": "CVE-2025-21433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21433"
},
{
"name": "CVE-2025-27034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27034"
},
{
"name": "CVE-2025-8109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8109"
},
{
"name": "CVE-2025-21481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21481"
},
{
"name": "CVE-2025-48535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48535"
},
{
"name": "CVE-2025-48527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48527"
},
{
"name": "CVE-2025-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27032"
},
{
"name": "CVE-2025-48539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48539"
},
{
"name": "CVE-2025-48540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48540"
},
{
"name": "CVE-2025-47317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47317"
},
{
"name": "CVE-2025-32333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32333"
},
{
"name": "CVE-2025-21465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21465"
},
{
"name": "CVE-2025-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25180"
},
{
"name": "CVE-2025-48563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48563"
},
{
"name": "CVE-2025-48526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48526"
},
{
"name": "CVE-2025-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27052"
},
{
"name": "CVE-2025-48538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48538"
},
{
"name": "CVE-2025-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20703"
},
{
"name": "CVE-2025-21482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21482"
},
{
"name": "CVE-2025-21755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
},
{
"name": "CVE-2024-7881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7881"
},
{
"name": "CVE-2025-48556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48556"
},
{
"name": "CVE-2025-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27043"
},
{
"name": "CVE-2025-21464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21464"
},
{
"name": "CVE-2025-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20696"
},
{
"name": "CVE-2025-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21449"
},
{
"name": "CVE-2025-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0076"
},
{
"name": "CVE-2025-1246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1246"
},
{
"name": "CVE-2025-26454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26454"
},
{
"name": "CVE-2025-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21427"
},
{
"name": "CVE-2025-32347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32347"
},
{
"name": "CVE-2025-47329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47329"
},
{
"name": "CVE-2025-21483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21483"
},
{
"name": "CVE-2025-21446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21446"
},
{
"name": "CVE-2025-32325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32325"
},
{
"name": "CVE-2025-25179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25179"
},
{
"name": "CVE-2021-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39810"
},
{
"name": "CVE-2025-48528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48528"
},
{
"name": "CVE-2025-32349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32349"
},
{
"name": "CVE-2025-32345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32345"
},
{
"name": "CVE-2025-48524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48524"
},
{
"name": "CVE-2025-21432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21432"
},
{
"name": "CVE-2025-48542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48542"
},
{
"name": "CVE-2025-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48522"
},
{
"name": "CVE-2025-32331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32331"
},
{
"name": "CVE-2025-48546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48546"
},
{
"name": "CVE-2025-48581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48581"
},
{
"name": "CVE-2025-48551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48551"
},
{
"name": "CVE-2025-27061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27061"
},
{
"name": "CVE-2024-49714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49714"
},
{
"name": "CVE-2025-48547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48547"
},
{
"name": "CVE-2025-48537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48537"
},
{
"name": "CVE-2025-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0467"
},
{
"name": "CVE-2025-46708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46708"
},
{
"name": "CVE-2025-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47318"
},
{
"name": "CVE-2025-21450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21450"
},
{
"name": "CVE-2025-48550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48550"
},
{
"name": "CVE-2025-021701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-021701"
},
{
"name": "CVE-2025-48561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48561"
},
{
"name": "CVE-2025-48553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48553"
},
{
"name": "CVE-2025-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27042"
},
{
"name": "CVE-2025-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48554"
},
{
"name": "CVE-2025-48549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48549"
},
{
"name": "CVE-2025-21477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21477"
},
{
"name": "CVE-2025-48529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48529"
},
{
"name": "CVE-2025-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46710"
},
{
"name": "CVE-2025-32327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32327"
},
{
"name": "CVE-2024-47899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47899"
},
{
"name": "CVE-2025-32332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32332"
},
{
"name": "CVE-2025-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48560"
},
{
"name": "CVE-2025-48559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48559"
},
{
"name": "CVE-2025-1706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1706"
},
{
"name": "CVE-2025-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0089"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2025-32330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32330"
},
{
"name": "CVE-2025-32326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32326"
},
{
"name": "CVE-2025-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27056"
},
{
"name": "CVE-2025-21488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21488"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32324"
},
{
"name": "CVE-2025-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27057"
},
{
"name": "CVE-2025-48532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48532"
},
{
"name": "CVE-2025-27066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27066"
},
{
"name": "CVE-2025-48552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48552"
},
{
"name": "CVE-2024-47898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47898"
},
{
"name": "CVE-2025-48545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48545"
},
{
"name": "CVE-2025-27073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27073"
},
{
"name": "CVE-2025-32350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32350"
},
{
"name": "CVE-2025-21484",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21484"
},
{
"name": "CVE-2025-48523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48523"
},
{
"name": "CVE-2025-48543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48543"
},
{
"name": "CVE-2025-48562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48562"
},
{
"name": "CVE-2025-32321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32321"
},
{
"name": "CVE-2025-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26464"
},
{
"name": "CVE-2025-32346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32346"
},
{
"name": "CVE-2025-20704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20704"
},
{
"name": "CVE-2025-48548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48548"
},
{
"name": "CVE-2025-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21454"
},
{
"name": "CVE-2025-46707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46707"
},
{
"name": "CVE-2025-20708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20708"
},
{
"name": "CVE-2025-48558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48558"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0750",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que les vuln\u00e9rabilit\u00e9s CVE-2025-38352 et CVE-2025-48543 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-09-01?hl=fr"
}
]
}
GHSA-Q4F4-383R-XPM6
Vulnerability from github – Published: 2025-09-24 18:30 – Updated: 2025-09-24 18:30Memory corruption due to global buffer overflow when a test command uses an invalid payload type.
{
"affected": [],
"aliases": [
"CVE-2025-47317"
],
"database_specific": {
"cwe_ids": [
"CWE-126"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-24T16:15:36Z",
"severity": "HIGH"
},
"details": "Memory corruption due to global buffer overflow when a test command uses an invalid payload type.",
"id": "GHSA-q4f4-383r-xpm6",
"modified": "2025-09-24T18:30:30Z",
"published": "2025-09-24T18:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47317"
},
{
"type": "WEB",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.