Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-20233 (GCVE-0-2025-20233)
Vulnerability from cvelistv5 – Published: 2025-03-26 22:06 – Updated: 2025-03-27 13:49- CWE-732 - The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Splunk | Splunk App for Lookup File Editing |
Affected:
4.0 , < 4.0.5
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20233",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-27T13:48:56.451759Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-27T13:49:03.631Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Splunk App for Lookup File Editing",
"vendor": "Splunk",
"versions": [
{
"lessThan": "4.0.5",
"status": "affected",
"version": "4.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Kyle Bambrick, Splunk"
}
],
"datePublic": "2025-03-26T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user."
}
],
"value": "In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-26T22:06:39.987Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
}
],
"source": {
"advisory": "SVD-2025-0310"
},
"title": "Incorrect permissions set by the \u201cchmod\u201c and \u201cmakedirs\u201c Python functions in Splunk App for Lookup File Editing"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20233",
"datePublished": "2025-03-26T22:06:39.987Z",
"dateReserved": "2024-10-10T19:15:13.237Z",
"dateUpdated": "2025-03-27T13:49:03.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20233\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-03-26T22:15:15.390\",\"lastModified\":\"2025-08-01T18:03:30.680\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.\"},{\"lang\":\"es\",\"value\":\"En las versiones de Splunk App for Lookup File Editing anteriores a la 4.0.5, un script de la aplicaci\u00f3n utilizaba las funciones de Python `chmod` y `makedirs`, lo que resultaba en permisos de lectura y ejecuci\u00f3n excesivamente amplios. Esto pod\u00eda generar un control de acceso inadecuado para un usuario con pocos privilegios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":2.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_app_for_lookup_file_editing:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.0.5\",\"matchCriteriaId\":\"53233DEC-C566-4592-A7AC-C4A495114FAA\"}]}]}],\"references\":[{\"url\":\"https://advisory.splunk.com/advisories/SVD-2025-0310\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20233\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-27T13:48:56.451759Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-27T13:48:59.609Z\"}}], \"cna\": {\"title\": \"Incorrect permissions set by the \\u201cchmod\\u201c and \\u201cmakedirs\\u201c Python functions in Splunk App for Lookup File Editing\", \"source\": {\"advisory\": \"SVD-2025-0310\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Kyle Bambrick, Splunk\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 2.5, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Splunk\", \"product\": \"Splunk App for Lookup File Editing\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\", \"lessThan\": \"4.0.5\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2025-03-26T00:00:00.000Z\", \"references\": [{\"url\": \"https://advisory.splunk.com/advisories/SVD-2025-0310\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-732\", \"description\": \"The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-03-26T22:06:39.987Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20233\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-27T13:49:03.631Z\", \"dateReserved\": \"2024-10-10T19:15:13.237Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-03-26T22:06:39.987Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-20233
Vulnerability from fkie_nvd - Published: 2025-03-26 22:15 - Updated: 2025-08-01 18:033.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://advisory.splunk.com/advisories/SVD-2025-0310 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| splunk | splunk_app_for_lookup_file_editing | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk_app_for_lookup_file_editing:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53233DEC-C566-4592-A7AC-C4A495114FAA",
"versionEndExcluding": "4.0.5",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user."
},
{
"lang": "es",
"value": "En las versiones de Splunk App for Lookup File Editing anteriores a la 4.0.5, un script de la aplicaci\u00f3n utilizaba las funciones de Python `chmod` y `makedirs`, lo que resultaba en permisos de lectura y ejecuci\u00f3n excesivamente amplios. Esto pod\u00eda generar un control de acceso inadecuado para un usuario con pocos privilegios."
}
],
"id": "CVE-2025-20233",
"lastModified": "2025-08-01T18:03:30.680",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-03-26T22:15:15.390",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "psirt@cisco.com",
"type": "Primary"
}
]
}
CERTFR-2025-AVI-0245
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.8.x antérieures à 3.8.38 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.7.x antérieures à 3.7.23 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408.10x antérieures à 9.3.2408.107 | ||
| Splunk | Splunk Add-on for Microsoft Cloud Services | Splunk Add-on for Microsoft Cloud Services versions 5.4.x antérieures à 5.4.3 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.8 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.x antérieures à 9.1.2312.208 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.3 | ||
| Splunk | Splunk Infrastructure Monitoring Add-on | Splunk Infrastructure Monitoring Add-on versions antérieures à 1.2.7 | ||
| Splunk | Splunk App for Data Science and Deep Learning | Splunk App for Data Science and Deep Learning versions 5.1.x antérieures à 5.2.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.5 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.x antérieures à 9.2.2403.115 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406.10x antérieures à 9.2.2406.113 | ||
| Splunk | Splunk App for Lookup File Editing | Splunk App for Lookup File Editing versions 4.0.x antérieures à 4.0.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.38",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.23",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408.10x ant\u00e9rieures \u00e0 9.3.2408.107",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Add-on for Microsoft Cloud Services versions 5.4.x ant\u00e9rieures \u00e0 5.4.3",
"product": {
"name": "Splunk Add-on for Microsoft Cloud Services",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.x ant\u00e9rieures \u00e0 9.1.2312.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Infrastructure Monitoring Add-on versions ant\u00e9rieures \u00e0 1.2.7",
"product": {
"name": "Splunk Infrastructure Monitoring Add-on",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Data Science and Deep Learning versions 5.1.x ant\u00e9rieures \u00e0 5.2.0",
"product": {
"name": "Splunk App for Data Science and Deep Learning",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.x ant\u00e9rieures \u00e0 9.2.2403.115",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406.10x ant\u00e9rieures \u00e0 9.2.2406.113",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Lookup File Editing versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
"product": {
"name": "Splunk App for Lookup File Editing",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20229"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20232"
},
{
"name": "CVE-2025-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20227"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2025-20226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20226"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20228"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2025-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20231"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-20233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20233"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-20230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20230"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0245",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0312"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0313"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0309"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0308"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0311"
}
]
}
CERTFR-2025-AVI-0245
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.8.x antérieures à 3.8.38 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.7.x antérieures à 3.7.23 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408.10x antérieures à 9.3.2408.107 | ||
| Splunk | Splunk Add-on for Microsoft Cloud Services | Splunk Add-on for Microsoft Cloud Services versions 5.4.x antérieures à 5.4.3 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.8 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.x antérieures à 9.1.2312.208 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.3 | ||
| Splunk | Splunk Infrastructure Monitoring Add-on | Splunk Infrastructure Monitoring Add-on versions antérieures à 1.2.7 | ||
| Splunk | Splunk App for Data Science and Deep Learning | Splunk App for Data Science and Deep Learning versions 5.1.x antérieures à 5.2.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.5 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.x antérieures à 9.2.2403.115 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406.10x antérieures à 9.2.2406.113 | ||
| Splunk | Splunk App for Lookup File Editing | Splunk App for Lookup File Editing versions 4.0.x antérieures à 4.0.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.38",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.23",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408.10x ant\u00e9rieures \u00e0 9.3.2408.107",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Add-on for Microsoft Cloud Services versions 5.4.x ant\u00e9rieures \u00e0 5.4.3",
"product": {
"name": "Splunk Add-on for Microsoft Cloud Services",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.x ant\u00e9rieures \u00e0 9.1.2312.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Infrastructure Monitoring Add-on versions ant\u00e9rieures \u00e0 1.2.7",
"product": {
"name": "Splunk Infrastructure Monitoring Add-on",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Data Science and Deep Learning versions 5.1.x ant\u00e9rieures \u00e0 5.2.0",
"product": {
"name": "Splunk App for Data Science and Deep Learning",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.x ant\u00e9rieures \u00e0 9.2.2403.115",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise\tversions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406.10x ant\u00e9rieures \u00e0 9.2.2406.113",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Lookup File Editing versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
"product": {
"name": "Splunk App for Lookup File Editing",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20229"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20232"
},
{
"name": "CVE-2025-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20227"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2025-20226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20226"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20228"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2025-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20231"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-20233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20233"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-20230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20230"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0245",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0312"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0313"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0309"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0308"
},
{
"published_at": "2025-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0311"
}
]
}
WID-SEC-W-2025-0647
Vulnerability from csaf_certbund - Published: 2025-03-26 23:00 - Updated: 2025-06-02 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen preiszugeben, Daten zu manipulieren, Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und weitere, nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0647 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0647.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0647 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0647"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0301 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0302 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0303 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0304 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0305 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0306 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0307 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0310 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0308 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0308"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0309 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0309"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0311 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0311"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0312 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0312"
},
{
"category": "external",
"summary": "Splunk Vulnerability Disclosure SVD-2025-0313 vom 2025-03-26",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0313"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2025-0603 vom 2025-06-02",
"url": "https://advisory.splunk.com//advisories/SVD-2025-0603"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-02T22:00:00.000+00:00",
"generator": {
"date": "2025-06-03T09:28:24.304+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0647",
"initial_release_date": "2025-03-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.4.0",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.4.0",
"product_id": "T042184"
}
},
{
"category": "product_version",
"name": "9.4.0",
"product": {
"name": "Splunk Splunk Enterprise 9.4.0",
"product_id": "T042184-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.3",
"product_id": "T042185"
}
},
{
"category": "product_version",
"name": "9.3.3",
"product": {
"name": "Splunk Splunk Enterprise 9.3.3",
"product_id": "T042185-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.5",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.5",
"product_id": "T042186"
}
},
{
"category": "product_version",
"name": "9.2.5",
"product": {
"name": "Splunk Splunk Enterprise 9.2.5",
"product_id": "T042186-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.8",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.8",
"product_id": "T042187"
}
},
{
"category": "product_version",
"name": "9.1.8",
"product": {
"name": "Splunk Splunk Enterprise 9.1.8",
"product_id": "T042187-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.4.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.4.1",
"product_id": "T042188"
}
},
{
"category": "product_version",
"name": "9.4.1",
"product": {
"name": "Splunk Splunk Enterprise 9.4.1",
"product_id": "T042188-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.4.1"
}
}
},
{
"category": "product_version_range",
"name": "SplunkApp Lookup File Editing \u003c4.0.5",
"product": {
"name": "Splunk Splunk Enterprise SplunkApp Lookup File Editing \u003c4.0.5",
"product_id": "T042189"
}
},
{
"category": "product_version",
"name": "SplunkApp Lookup File Editing 4.0.5",
"product": {
"name": "Splunk Splunk Enterprise SplunkApp Lookup File Editing 4.0.5",
"product_id": "T042189-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:splunkapp_lookup_file_editing__4.0.5"
}
}
},
{
"category": "product_version_range",
"name": "SplunkApp Data Science and Deep Learning \u003c5.2.0",
"product": {
"name": "Splunk Splunk Enterprise SplunkApp Data Science and Deep Learning \u003c5.2.0",
"product_id": "T042190"
}
},
{
"category": "product_version",
"name": "SplunkApp Data Science and Deep Learning 5.2.0",
"product": {
"name": "Splunk Splunk Enterprise SplunkApp Data Science and Deep Learning 5.2.0",
"product_id": "T042190-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:splunkapp_data_science_and_deep_learning__5.2.0"
}
}
},
{
"category": "product_version_range",
"name": "Spunk DB Connect \u003c4.0.0",
"product": {
"name": "Splunk Splunk Enterprise Spunk DB Connect \u003c4.0.0",
"product_id": "T042191"
}
},
{
"category": "product_version",
"name": "Spunk DB Connect 4.0.0",
"product": {
"name": "Splunk Splunk Enterprise Spunk DB Connect 4.0.0",
"product_id": "T042191-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:spunk_db_connect__4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "Splunk Add-on Microsoft Cloud \u003c5.4.3",
"product": {
"name": "Splunk Splunk Enterprise Splunk Add-on Microsoft Cloud \u003c5.4.3",
"product_id": "T042192"
}
},
{
"category": "product_version",
"name": "Splunk Add-on Microsoft Cloud 5.4.3",
"product": {
"name": "Splunk Splunk Enterprise Splunk Add-on Microsoft Cloud 5.4.3",
"product_id": "T042192-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:splunk_add-on_microsoft_cloud__5.4.3"
}
}
},
{
"category": "product_version_range",
"name": "Splunk Infrastructure Monitoring Add-on \u003c1.2.7",
"product": {
"name": "Splunk Splunk Enterprise Splunk Infrastructure Monitoring Add-on \u003c1.2.7",
"product_id": "T042194"
}
},
{
"category": "product_version",
"name": "Splunk Infrastructure Monitoring Add-on 1.2.7",
"product": {
"name": "Splunk Splunk Enterprise Splunk Infrastructure Monitoring Add-on 1.2.7",
"product_id": "T042194-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:splunk_infrastructure_monitoring_add-on__1.2.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.4.2",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.4.2",
"product_id": "T044257"
}
},
{
"category": "product_version",
"name": "9.4.2",
"product": {
"name": "Splunk Splunk Enterprise 9.4.2",
"product_id": "T044257-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.4.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.4",
"product_id": "T044258"
}
},
{
"category": "product_version",
"name": "9.3.4",
"product": {
"name": "Splunk Splunk Enterprise 9.3.4",
"product_id": "T044258-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.6",
"product_id": "T044259"
}
},
{
"category": "product_version",
"name": "9.2.6",
"product": {
"name": "Splunk Splunk Enterprise 9.2.6",
"product_id": "T044259-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.9",
"product_id": "T044260"
}
},
{
"category": "product_version",
"name": "9.1.9",
"product": {
"name": "Splunk Splunk Enterprise 9.1.9",
"product_id": "T044260-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.9"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20230",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20230"
},
{
"cve": "CVE-2025-20227",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20227"
},
{
"cve": "CVE-2025-20228",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042185",
"T042186",
"T042187"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20228"
},
{
"cve": "CVE-2025-20229",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042184",
"T042185",
"T042186",
"T042187"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20229"
},
{
"cve": "CVE-2025-20231",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20231"
},
{
"cve": "CVE-2025-20226",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042185",
"T042186",
"T042187"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20226"
},
{
"cve": "CVE-2025-20232",
"product_status": {
"known_affected": [
"T044258",
"T044257",
"T044259",
"T044260",
"T042185",
"T042186",
"T042187"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20232"
},
{
"cve": "CVE-2025-20233",
"product_status": {
"known_affected": [
"T042189",
"T044258",
"T044257",
"T044259",
"T044260"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2025-20233"
},
{
"cve": "CVE-2023-5363",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-21090",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-21090"
},
{
"cve": "CVE-2024-21272",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-29857",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-38999",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39338",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-39338"
},
{
"cve": "CVE-2024-45801",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-45801"
},
{
"cve": "CVE-2024-4603",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-47875",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-47875"
},
{
"cve": "CVE-2024-6923",
"product_status": {
"known_affected": [
"T042190",
"T042191",
"T042189",
"T044258",
"T044257",
"T044259",
"T042192",
"T044260",
"T042194",
"T042184",
"T042185",
"T042186",
"T042187",
"T042188"
]
},
"release_date": "2025-03-26T23:00:00.000+00:00",
"title": "CVE-2024-6923"
}
]
}
GHSA-X67M-XW25-VPG2
Vulnerability from github – Published: 2025-03-27 00:31 – Updated: 2025-03-27 00:31In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the chmod and makedirs Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.
{
"affected": [],
"aliases": [
"CVE-2025-20233"
],
"database_specific": {
"cwe_ids": [
"CWE-732"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-26T22:15:15Z",
"severity": "LOW"
},
"details": "In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user.",
"id": "GHSA-x67m-xw25-vpg2",
"modified": "2025-03-27T00:31:49Z",
"published": "2025-03-27T00:31:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20233"
},
{
"type": "WEB",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
NCSC-2025-0099
Vulnerability from csaf_ncscnl - Published: 2025-03-27 09:18 - Updated: 2025-03-27 09:18Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Splunk heeft kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen laaggeprivilegieerde gebruikers in staat om hogere gebruikersrechten te misbruiken, wat kan leiden tot ongeautoriseerde acties en toegang tot gevoelige informatie. Dit kan gebeuren via phishing-aanvallen en Cross-Site Request Forgery (CSRF) aanvallen, wat de integriteit en vertrouwelijkheid van gegevens in gevaar kan brengen. De kwetsbaarheden omvatten ook ongeautoriseerde bestandsuploads en onjuiste toegang tot gegevens in KVStore-collecties, wat kan resulteren in ongeautoriseerde wijzigingen aan gevoelige data.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Splunk heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
}
],
"title": "Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform",
"tracking": {
"current_release_date": "2025-03-27T09:18:30.331072Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0099",
"initial_release_date": "2025-03-27T09:18:30.331072Z",
"revision_history": [
{
"date": "2025-03-27T09:18:30.331072Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.4|\u003c9.4.1",
"product": {
"name": "vers:unknown/9.4|\u003c9.4.1",
"product_id": "CSAFPID-2568180"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.3|\u003c9.3.3",
"product": {
"name": "vers:unknown/9.3|\u003c9.3.3",
"product_id": "CSAFPID-2568181"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.2|\u003c9.2.5",
"product": {
"name": "vers:unknown/9.2|\u003c9.2.5",
"product_id": "CSAFPID-2568182"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.1|\u003c9.1.8",
"product": {
"name": "vers:unknown/9.1|\u003c9.1.8",
"product_id": "CSAFPID-2568183"
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.3.2408|\u003c9.3.2408.107",
"product": {
"name": "vers:unknown/9.3.2408|\u003c9.3.2408.107",
"product_id": "CSAFPID-2568186"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.2.2406|\u003c9.2.2406.113",
"product": {
"name": "vers:unknown/9.2.2406|\u003c9.2.2406.113",
"product_id": "CSAFPID-2568190"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.1.2312|\u003c9.1.2312.208",
"product": {
"name": "vers:unknown/9.1.2312|\u003c9.1.2312.208",
"product_id": "CSAFPID-2568192"
}
}
],
"category": "product_name",
"name": "Splunk Cloud Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/3.8|\u003c3.8.38",
"product": {
"name": "vers:unknown/3.8|\u003c3.8.38",
"product_id": "CSAFPID-2568184"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/3.7|\u003c3.7.23",
"product": {
"name": "vers:unknown/3.7|\u003c3.7.23",
"product_id": "CSAFPID-2568185"
}
}
],
"category": "product_name",
"name": "Splunk Secure Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-2437053"
}
}
],
"category": "product_name",
"name": "splunk"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-20226",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20226",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20226.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20226"
},
{
"cve": "CVE-2025-20227",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20227"
},
{
"cve": "CVE-2025-20228",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20228",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20228.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20228"
},
{
"cve": "CVE-2025-20229",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20229",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20229.json"
}
],
"title": "CVE-2025-20229"
},
{
"cve": "CVE-2025-20230",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20230.json"
}
],
"title": "CVE-2025-20230"
},
{
"cve": "CVE-2025-20231",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20231"
},
{
"cve": "CVE-2025-20232",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20232"
},
{
"cve": "CVE-2025-20233",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2568180",
"CSAFPID-2568181",
"CSAFPID-2568182",
"CSAFPID-2568183",
"CSAFPID-2568186",
"CSAFPID-2568190",
"CSAFPID-2568192",
"CSAFPID-2568184",
"CSAFPID-2568185",
"CSAFPID-2437053"
]
}
],
"title": "CVE-2025-20233"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.