NCSC-2025-0112
Vulnerability from csaf_ncscnl - Published: 2025-04-08 18:57 - Updated: 2025-04-08 18:57Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties: Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- Uitvoer van willekeurige code (root/adminrechten)
- Uitvoer van willekeurige code (Gebruikersrechten)
- Verkrijgen van verhoogde rechten
- Toegang tot gevoelige gegevens
- Voordoen als andere gebruiker
Van de kwetsbaarheid met kenmerk CVE-2025-29824 geeft Microsoft aan dat deze eerder actief is misbruikt als zero-day. Er is geen publieke Proof-of-Concept (PoC) of exploitcode bekend. Een kwaadwillende die met succes deze kwetsbaarheid misbruikt, zou SYSTEM-rechten kunnen verkrijgen.
```
Windows Subsystem for Linux:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26675 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows upnphost.dll:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26665 | 7,00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Mark of the Web (MOTW):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27472 | 5,40 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Remote Desktop Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26671 | 8,10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Update Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21204 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27475 | 7,00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Mobile Broadband:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29811 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Standards-Based Storage Management Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27470 | 7,50 | Denial-of-Service |
| CVE-2025-27486 | 7,50 | Denial-of-Service |
| CVE-2025-26652 | 7,50 | Denial-of-Service |
| CVE-2025-26680 | 7,50 | Denial-of-Service |
| CVE-2025-27485 | 7,50 | Denial-of-Service |
| CVE-2025-21174 | 7,50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Digital Media:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26640 | 7,00 | Verkrijgen van verhoogde rechten |
| CVE-2025-27467 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27476 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27730 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26648 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27739 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Remote Desktop Client:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27487 | 8,00 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Virtualization-Based Security (VBS) Enclave:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27735 | 6,00 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27728 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Resilient File System (ReFS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27738 | 6,50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Active Directory Certificate Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27740 | 8,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Power Dependency Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27736 | 5,50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Installer:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27727 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Bluetooth Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27490 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Hello:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26635 | 6,50 | Omzeilen van beveiligingsmaatregel |
| CVE-2025-26644 | 6,20 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Local Security Authority (LSA):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21191 | 7,00 | Verkrijgen van verhoogde rechten |
| CVE-2025-27478 | 7,00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
RPC Endpoint Mapper Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26679 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kerberos:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29809 | 7,10 | Omzeilen van beveiligingsmaatregel |
| CVE-2025-26647 | 8,10 | Voordoen als andere gebruiker |
| CVE-2025-27479 | 7,50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26641 | 7,50 | Denial-of-Service |
| CVE-2025-29808 | 5,50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows NTFS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27483 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27742 | 5,50 | Toegang tot gevoelige gegevens |
| CVE-2025-21197 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-27733 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-27741 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Routing and Remote Access Service (RRAS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26667 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-26672 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-26676 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-27474 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-21203 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-26664 | 6,50 | Toegang tot gevoelige gegevens |
| CVE-2025-26668 | 7,50 | Uitvoeren van willekeurige code |
| CVE-2025-26669 | 8,80 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27491 | 7,10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27471 | 5,90 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Kernel Memory:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29812 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Virtual Hard Drive:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26688 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Security Zone Mapping:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27737 | 8,60 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
OpenSSH for Windows:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27731 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Secure Channel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27492 | 7,00 | Verkrijgen van verhoogde rechten |
| CVE-2025-26649 | 7,00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Remote Desktop Gateway Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27480 | 8,10 | Uitvoeren van willekeurige code |
| CVE-2025-27482 | 8,10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26681 | 6,70 | Verkrijgen van verhoogde rechten |
| CVE-2025-26687 | 7,50 | Verkrijgen van verhoogde rechten |
| CVE-2025-27732 | 7,00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Media:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26666 | 7,80 | Uitvoeren van willekeurige code |
| CVE-2025-26674 | 7,80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Common Log File System Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29824 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows HTTP.sys:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27473 | 7,50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Local Session Manager (LSM):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26651 | 6,50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows USB Print Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26639 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26686 | 7,50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows LDAP - Lightweight Directory Access Protocol:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26670 | 8,10 | Uitvoeren van willekeurige code |
| CVE-2025-27469 | 7,50 | Denial-of-Service |
| CVE-2025-26663 | 8,10 | Uitvoeren van willekeurige code |
| CVE-2025-26673 | 7,50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Universal Plug and Play (UPnP) Device Host:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27484 | 7,50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Telephony Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-21205 | 8,80 | Uitvoeren van willekeurige code |
| CVE-2025-21221 | 8,80 | Uitvoeren van willekeurige code |
| CVE-2025-21222 | 8,80 | Uitvoeren van willekeurige code |
| CVE-2025-27477 | 8,80 | Uitvoeren van willekeurige code |
| CVE-2025-27481 | 8,80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows DWM Core Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-24073 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-24062 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-24058 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-24074 | 7,80 | Verkrijgen van verhoogde rechten |
| CVE-2025-24060 | 7,80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows BitLocker:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26637 | 6,80 | Omzeilen van beveiligingsmaatregel, Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Defender Application Control (WDAC):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-26678 | 8,40 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Shell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-27729 | 7,80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Active Directory Domain Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-29810 | 7,50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Dreigingsinformatie:
Kans: medium
Schade: high
CWE-591: Sensitive Data Storage in Improperly Locked Memory
CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation
CWE-749: Exposed Dangerous Method or Function
CWE-1390: Weak Authentication
CWE-1039: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
CWE-59: Improper Link Resolution Before File Access ('Link Following')
CWE-922: Insecure Storage of Sensitive Information
CWE-822: Untrusted Pointer Dereference
CWE-126: Buffer Over-read
CWE-410: Insufficient Resource Pool
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-415: Double Free
CWE-908: Use of Uninitialized Resource
CWE-345: Insufficient Verification of Data Authenticity
CWE-190: Integer Overflow or Wraparound
CWE-693: Protection Mechanism Failure
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125: Out-of-bounds Read
CWE-284: Improper Access Control
CWE-416: Use After Free
CWE-400: Uncontrolled Resource Consumption
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-122: Heap-based Buffer Overflow
CWE-121: Stack-based Buffer Overflow
CWE-20: Improper Input Validation
CWE-400
- Uncontrolled Resource Consumption
CWE-367
- Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-284
- Improper Access Control
CWE-126
- Buffer Over-read
CWE-59
- Improper Link Resolution Before File Access ('Link Following')
CWE-122
- Heap-based Buffer Overflow
CWE-122
- Heap-based Buffer Overflow
CWE-122
- Heap-based Buffer Overflow
CWE-20
- Improper Input Validation
CWE-20
- Improper Input Validation
CWE-20
- Improper Input Validation
CWE-20
- Improper Input Validation
CWE-20
- Improper Input Validation
CWE-1390
- Weak Authentication
CWE-693
- Protection Mechanism Failure
CWE-190
- Integer Overflow or Wraparound
CWE-416
- Use After Free
CWE-400
- Uncontrolled Resource Consumption
CWE-1039
- Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
CWE-20
- Improper Input Validation
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-362
- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-749
- Exposed Dangerous Method or Function
CWE-400
- Uncontrolled Resource Consumption
CWE-416
- Use After Free
CWE-126
- Buffer Over-read
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-122
- Heap-based Buffer Overflow
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
- Heap-based Buffer Overflow
CWE-125
- Out-of-bounds Read
CWE-416
- Use After Free
CWE-416
- Use After Free
CWE-126
- Buffer Over-read
CWE-400
- Uncontrolled Resource Consumption
CWE-122
- Heap-based Buffer Overflow
CWE-125
- Out-of-bounds Read
CWE-126
- Buffer Over-read
CWE-284
- Improper Access Control
CWE-416
- Use After Free
CWE-400
- Uncontrolled Resource Consumption
CWE-416
- Use After Free
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-416
- Use After Free
CWE-121
- Stack-based Buffer Overflow
CWE-416
- Use After Free
CWE-400
- Uncontrolled Resource Consumption
CWE-400
- Uncontrolled Resource Consumption
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-693
- Protection Mechanism Failure
CWE-400
- Uncontrolled Resource Consumption
CWE-908
- Use of Uninitialized Resource
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-416
- Use After Free
CWE-122
- Heap-based Buffer Overflow
CWE-122
- Heap-based Buffer Overflow
CWE-410
- Insufficient Resource Pool
CWE-416
- Use After Free
CWE-121
- Stack-based Buffer Overflow
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-125
- Out-of-bounds Read
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-400
- Uncontrolled Resource Consumption
CWE-400
- Uncontrolled Resource Consumption
CWE-122
- Heap-based Buffer Overflow
CWE-122
- Heap-based Buffer Overflow
CWE-416
- Use After Free
CWE-362
- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-59
- Improper Link Resolution Before File Access ('Link Following')
CWE-125
- Out-of-bounds Read
CWE-416
- Use After Free
CWE-416
- Use After Free
CWE-20
- Improper Input Validation
CWE-591
- Sensitive Data Storage in Improperly Locked Memory
CWE-125
- Out-of-bounds Read
CWE-345
- Insufficient Verification of Data Authenticity
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
CWE-20
- Improper Input Validation
CWE-284
- Improper Access Control
CWE-822
- Untrusted Pointer Dereference
CWE-1390
- Weak Authentication
CWE-125
- Out-of-bounds Read
CWE-125
- Out-of-bounds Read
CWE-1240
- Use of a Cryptographic Primitive with a Risky Implementation
CWE-922
- Insecure Storage of Sensitive Information
CWE-284
- Improper Access Control
CWE-20
- Improper Input Validation
CWE-822
- Untrusted Pointer Dereference
CWE-416
- Use After Free
References
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- Uitvoer van willekeurige code (root/adminrechten)\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Verkrijgen van verhoogde rechten\n- Toegang tot gevoelige gegevens\n- Voordoen als andere gebruiker\n\nVan de kwetsbaarheid met kenmerk CVE-2025-29824 geeft Microsoft aan dat deze eerder actief is misbruikt als zero-day. Er is geen publieke Proof-of-Concept (PoC) of exploitcode bekend. Een kwaadwillende die met succes deze kwetsbaarheid misbruikt, zou SYSTEM-rechten kunnen verkrijgen.\n\n```\nWindows Subsystem for Linux: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26675 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows upnphost.dll: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26665 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27472 | 5,40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26671 | 8,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Update Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21204 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27475 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29811 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27470 | 7,50 | Denial-of-Service | \n| CVE-2025-27486 | 7,50 | Denial-of-Service | \n| CVE-2025-26652 | 7,50 | Denial-of-Service | \n| CVE-2025-26680 | 7,50 | Denial-of-Service | \n| CVE-2025-27485 | 7,50 | Denial-of-Service | \n| CVE-2025-21174 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Digital Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26640 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27467 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27476 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27730 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26648 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27739 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27487 | 8,00 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27735 | 6,00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27728 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27738 | 6,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Active Directory Certificate Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27740 | 8,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Power Dependency Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27736 | 5,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27727 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Bluetooth Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27490 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26635 | 6,50 | Omzeilen van beveiligingsmaatregel | \n| CVE-2025-26644 | 6,20 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority (LSA): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21191 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27478 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRPC Endpoint Mapper Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26679 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29809 | 7,10 | Omzeilen van beveiligingsmaatregel | \n| CVE-2025-26647 | 8,10 | Voordoen als andere gebruiker | \n| CVE-2025-27479 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26641 | 7,50 | Denial-of-Service | \n| CVE-2025-29808 | 5,50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27483 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27742 | 5,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-21197 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-27733 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27741 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26667 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26672 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26676 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-27474 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-21203 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26664 | 6,50 | Toegang tot gevoelige gegevens | \n| CVE-2025-26668 | 7,50 | Uitvoeren van willekeurige code | \n| CVE-2025-26669 | 8,80 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27491 | 7,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27471 | 5,90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Kernel Memory: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29812 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Virtual Hard Drive: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26688 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Security Zone Mapping: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27737 | 8,60 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nOpenSSH for Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27731 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Secure Channel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27492 | 7,00 | Verkrijgen van verhoogde rechten | \n| CVE-2025-26649 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Gateway Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27480 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-27482 | 8,10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26681 | 6,70 | Verkrijgen van verhoogde rechten | \n| CVE-2025-26687 | 7,50 | Verkrijgen van verhoogde rechten | \n| CVE-2025-27732 | 7,00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26666 | 7,80 | Uitvoeren van willekeurige code | \n| CVE-2025-26674 | 7,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29824 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows HTTP.sys: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27473 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Local Session Manager (LSM): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26651 | 6,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows USB Print Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26639 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26686 | 7,50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows LDAP - Lightweight Directory Access Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26670 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-27469 | 7,50 | Denial-of-Service | \n| CVE-2025-26663 | 8,10 | Uitvoeren van willekeurige code | \n| CVE-2025-26673 | 7,50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Universal Plug and Play (UPnP) Device Host: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27484 | 7,50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Telephony Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-21205 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-21221 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-21222 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-27477 | 8,80 | Uitvoeren van willekeurige code | \n| CVE-2025-27481 | 8,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-24073 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24062 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24058 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24074 | 7,80 | Verkrijgen van verhoogde rechten | \n| CVE-2025-24060 | 7,80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26637 | 6,80 | Omzeilen van beveiligingsmaatregel, Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Defender Application Control (WDAC): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-26678 | 8,40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-27729 | 7,80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nActive Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-29810 | 7,50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
},
{
"category": "general",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism",
"title": "CWE-1039"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Insufficient Resource Pool",
"title": "CWE-410"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2025-04-08T18:57:53.660384Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0112",
"initial_release_date": "2025-04-08T18:57:53.660384Z",
"revision_history": [
{
"date": "2025-04-08T18:57:53.660384Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Microsoft Office for Android"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Microsoft Office for Universal"
}
],
"category": "product_family",
"name": "Microsoft Office"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1440176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*"
}
}
}
],
"category": "product_name",
"name": "Remote Desktop client for Windows Desktop"
},
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1332109"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.14393.7970",
"product": {
"name": "vers:microsoft/10.0.14393.7970",
"product_id": "CSAFPID-2633264",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1607 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.14393.7970",
"product": {
"name": "vers:microsoft/10.0.14393.7970",
"product_id": "CSAFPID-2633265",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1607 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.17763.7137",
"product": {
"name": "vers:microsoft/10.0.17763.7137",
"product_id": "CSAFPID-2633241",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1809 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.17763.7137",
"product": {
"name": "vers:microsoft/10.0.17763.7137",
"product_id": "CSAFPID-2633242",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1809 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19044.5737",
"product": {
"name": "vers:microsoft/10.0.19044.5737",
"product_id": "CSAFPID-2633247",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19044.5737",
"product": {
"name": "vers:microsoft/10.0.19044.5737",
"product_id": "CSAFPID-2633248",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:arm64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19044.5737",
"product": {
"name": "vers:microsoft/10.0.19044.5737",
"product_id": "CSAFPID-2633249",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19045.5737",
"product": {
"name": "vers:microsoft/10.0.19045.5737",
"product_id": "CSAFPID-2633254",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19045.5737",
"product": {
"name": "vers:microsoft/10.0.19045.5737",
"product_id": "CSAFPID-2633253",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:arm64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.19045.5737",
"product": {
"name": "vers:microsoft/10.0.19045.5737",
"product_id": "CSAFPID-2633252",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-2633262",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-2633263",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 10 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.22621.5191",
"product": {
"name": "vers:microsoft/10.0.22621.5191",
"product_id": "CSAFPID-2633250",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:arm64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 22H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.22621.5191",
"product": {
"name": "vers:microsoft/10.0.22621.5191",
"product_id": "CSAFPID-2633251",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 22H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.22621.5191",
"product": {
"name": "vers:microsoft/10.0.22621.5191",
"product_id": "CSAFPID-2633256",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22621.5191:*:*:*:*:*:arm64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 23H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.22631.5191",
"product": {
"name": "vers:microsoft/10.0.22631.5191",
"product_id": "CSAFPID-2633257",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5191:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 23H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.26100.3775",
"product": {
"name": "vers:microsoft/10.0.26100.3775",
"product_id": "CSAFPID-2633259",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:arm64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 24H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.26100.3775",
"product": {
"name": "vers:microsoft/10.0.26100.3775",
"product_id": "CSAFPID-2633260",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows 11 Version 24H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1440177",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows App Client for Windows Desktop"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.14393.7970",
"product": {
"name": "vers:microsoft/10.0.14393.7970",
"product_id": "CSAFPID-2633266",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.14393.7970",
"product": {
"name": "vers:microsoft/10.0.14393.7970",
"product_id": "CSAFPID-2633267",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2016 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.17763.7137",
"product": {
"name": "vers:microsoft/10.0.17763.7137",
"product_id": "CSAFPID-2633243",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.17763.7137",
"product": {
"name": "vers:microsoft/10.0.17763.7137",
"product_id": "CSAFPID-2633244",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2019 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.20348.3454",
"product": {
"name": "vers:microsoft/10.0.20348.3454",
"product_id": "CSAFPID-2633245",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.20348.3454",
"product": {
"name": "vers:microsoft/10.0.20348.3454",
"product_id": "CSAFPID-2633246",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.25398.1551",
"product": {
"name": "vers:microsoft/10.0.25398.1551",
"product_id": "CSAFPID-2633258",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1551:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.26100.3775",
"product": {
"name": "vers:microsoft/10.0.26100.3775",
"product_id": "CSAFPID-2633261",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/10.0.26100.3775",
"product": {
"name": "vers:microsoft/10.0.26100.3775",
"product_id": "CSAFPID-2633255",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2025 (Server Core installation)"
}
],
"category": "product_family",
"name": "Windows"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.1.7601.27670",
"product": {
"name": "vers:microsoft/6.1.7601.27670",
"product_id": "CSAFPID-2633272",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.1.7601.27670",
"product": {
"name": "vers:microsoft/6.1.7601.27670",
"product_id": "CSAFPID-2633273",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.0.6003.23220",
"product": {
"name": "vers:microsoft/6.0.6003.23220",
"product_id": "CSAFPID-2633268",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.0.6003.23220",
"product": {
"name": "vers:microsoft/6.0.6003.23220",
"product_id": "CSAFPID-2633269",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.0.6003.23220",
"product": {
"name": "vers:microsoft/6.0.6003.23220",
"product_id": "CSAFPID-2633270",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for x64-based Systems Service Pack 2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.0.6003.23220",
"product": {
"name": "vers:microsoft/6.0.6003.23220",
"product_id": "CSAFPID-2633271",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.2.9200.25423",
"product": {
"name": "vers:microsoft/6.2.9200.25423",
"product_id": "CSAFPID-2633274",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2012"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.2.9200.25423",
"product": {
"name": "vers:microsoft/6.2.9200.25423",
"product_id": "CSAFPID-2633275",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2012 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.3.9600.22523",
"product": {
"name": "vers:microsoft/6.3.9600.22523",
"product_id": "CSAFPID-2633276",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/6.3.9600.22523",
"product": {
"name": "vers:microsoft/6.3.9600.22523",
"product_id": "CSAFPID-2633277",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2 (Server Core installation)"
}
],
"category": "product_family",
"name": "ESU"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21174",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21174",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21174.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21174"
},
{
"cve": "CVE-2025-21191",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21191",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21191.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21191"
},
{
"cve": "CVE-2025-21197",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21197"
},
{
"cve": "CVE-2025-21203",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21203"
},
{
"cve": "CVE-2025-21204",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21204.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21204"
},
{
"cve": "CVE-2025-21205",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21205",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21205.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21205"
},
{
"cve": "CVE-2025-21221",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21221",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21221.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21221"
},
{
"cve": "CVE-2025-21222",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21222",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21222.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-21222"
},
{
"cve": "CVE-2025-24058",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-24058"
},
{
"cve": "CVE-2025-24060",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-24060"
},
{
"cve": "CVE-2025-24062",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-24062"
},
{
"cve": "CVE-2025-24073",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24073.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-24073"
},
{
"cve": "CVE-2025-24074",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24074.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-24074"
},
{
"cve": "CVE-2025-26635",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26635"
},
{
"cve": "CVE-2025-26637",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26637",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26637.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26637"
},
{
"cve": "CVE-2025-26639",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26639",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26639.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26639"
},
{
"cve": "CVE-2025-26640",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26640",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26640.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26640"
},
{
"cve": "CVE-2025-26641",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26641",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26641.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26641"
},
{
"cve": "CVE-2025-26644",
"cwe": {
"id": "CWE-1039",
"name": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism"
},
"notes": [
{
"category": "other",
"text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism",
"title": "CWE-1039"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26644",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26644.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26644"
},
{
"cve": "CVE-2025-26647",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26647",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26647.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26647"
},
{
"cve": "CVE-2025-26648",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26648",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26648.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26648"
},
{
"cve": "CVE-2025-26649",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26649",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26649.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26649"
},
{
"cve": "CVE-2025-26651",
"cwe": {
"id": "CWE-749",
"name": "Exposed Dangerous Method or Function"
},
"notes": [
{
"category": "other",
"text": "Exposed Dangerous Method or Function",
"title": "CWE-749"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26651",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26651.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26651"
},
{
"cve": "CVE-2025-26652",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26652",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26652.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26652"
},
{
"cve": "CVE-2025-26663",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26663",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26663.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26663"
},
{
"cve": "CVE-2025-26664",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26664",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26664.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26664"
},
{
"cve": "CVE-2025-26665",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26665",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26665.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26665"
},
{
"cve": "CVE-2025-26666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26666",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26666.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26666"
},
{
"cve": "CVE-2025-26667",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26667",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26667.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26667"
},
{
"cve": "CVE-2025-26668",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26668",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26668.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26668"
},
{
"cve": "CVE-2025-26669",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26669",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26669.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26669"
},
{
"cve": "CVE-2025-26670",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26670",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26670.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26670"
},
{
"cve": "CVE-2025-26671",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26671",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26671.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26671"
},
{
"cve": "CVE-2025-26672",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26672"
},
{
"cve": "CVE-2025-26673",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26673",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26673.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26673"
},
{
"cve": "CVE-2025-26674",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26674",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26674.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26674"
},
{
"cve": "CVE-2025-26675",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26675",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26675.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26675"
},
{
"cve": "CVE-2025-26676",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26676",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26676.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26676"
},
{
"cve": "CVE-2025-26678",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26678.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26678"
},
{
"cve": "CVE-2025-26679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26679",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26679.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26679"
},
{
"cve": "CVE-2025-26680",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26680",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26680.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26680"
},
{
"cve": "CVE-2025-26681",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26681",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26681"
},
{
"cve": "CVE-2025-26686",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26686",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26686.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26686"
},
{
"cve": "CVE-2025-26687",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26687",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26687.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26687"
},
{
"cve": "CVE-2025-26688",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26688",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26688.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-26688"
},
{
"cve": "CVE-2025-27467",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27467"
},
{
"cve": "CVE-2025-27469",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27469"
},
{
"cve": "CVE-2025-27470",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27470",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27470.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27470"
},
{
"cve": "CVE-2025-27471",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27471.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27471"
},
{
"cve": "CVE-2025-27472",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27472"
},
{
"cve": "CVE-2025-27473",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27473"
},
{
"cve": "CVE-2025-27474",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27474"
},
{
"cve": "CVE-2025-27475",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27475"
},
{
"cve": "CVE-2025-27476",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27476"
},
{
"cve": "CVE-2025-27477",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27477"
},
{
"cve": "CVE-2025-27478",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27478",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27478.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27478"
},
{
"cve": "CVE-2025-27479",
"cwe": {
"id": "CWE-410",
"name": "Insufficient Resource Pool"
},
"notes": [
{
"category": "other",
"text": "Insufficient Resource Pool",
"title": "CWE-410"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27479",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27479.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27479"
},
{
"cve": "CVE-2025-27480",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27480",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27480.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27480"
},
{
"cve": "CVE-2025-27481",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27481",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27481.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27481"
},
{
"cve": "CVE-2025-27482",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27482",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27482.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27482"
},
{
"cve": "CVE-2025-27483",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27483.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27483"
},
{
"cve": "CVE-2025-27484",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27484"
},
{
"cve": "CVE-2025-27485",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27485",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27485.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27485"
},
{
"cve": "CVE-2025-27486",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27486",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27486.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27486"
},
{
"cve": "CVE-2025-27487",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27487"
},
{
"cve": "CVE-2025-27490",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27490"
},
{
"cve": "CVE-2025-27491",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27491"
},
{
"cve": "CVE-2025-27492",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27492"
},
{
"cve": "CVE-2025-27727",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27727"
},
{
"cve": "CVE-2025-27728",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27728",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27728"
},
{
"cve": "CVE-2025-27729",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27729",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27729"
},
{
"cve": "CVE-2025-27730",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27730",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27730.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27730"
},
{
"cve": "CVE-2025-27731",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27731",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27731.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27731"
},
{
"cve": "CVE-2025-27732",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27732",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27732"
},
{
"cve": "CVE-2025-27733",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27733",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27733.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27733"
},
{
"cve": "CVE-2025-27735",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27735",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27735.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27735"
},
{
"cve": "CVE-2025-27736",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27736"
},
{
"cve": "CVE-2025-27737",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27737",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27737.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27737"
},
{
"cve": "CVE-2025-27738",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27738",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27738.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27738"
},
{
"cve": "CVE-2025-27739",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27739",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27739.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27739"
},
{
"cve": "CVE-2025-27740",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27740",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27740.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27740"
},
{
"cve": "CVE-2025-27741",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27741"
},
{
"cve": "CVE-2025-27742",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27742",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27742.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-27742"
},
{
"cve": "CVE-2025-29808",
"cwe": {
"id": "CWE-1240",
"name": "Use of a Cryptographic Primitive with a Risky Implementation"
},
"notes": [
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29808"
},
{
"cve": "CVE-2025-29809",
"cwe": {
"id": "CWE-922",
"name": "Insecure Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29809"
},
{
"cve": "CVE-2025-29810",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29810",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29810.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29810"
},
{
"cve": "CVE-2025-29811",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29811",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29811.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29811"
},
{
"cve": "CVE-2025-29812",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29812",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29812.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29812"
},
{
"cve": "CVE-2025-29824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1560265",
"CSAFPID-1560266",
"CSAFPID-1440176",
"CSAFPID-1332109",
"CSAFPID-2633264",
"CSAFPID-2633265",
"CSAFPID-2633241",
"CSAFPID-2633242",
"CSAFPID-2633247",
"CSAFPID-2633248",
"CSAFPID-2633249",
"CSAFPID-2633254",
"CSAFPID-2633253",
"CSAFPID-2633252",
"CSAFPID-2633262",
"CSAFPID-2633263",
"CSAFPID-2633250",
"CSAFPID-2633251",
"CSAFPID-2633256",
"CSAFPID-2633257",
"CSAFPID-2633259",
"CSAFPID-2633260",
"CSAFPID-1440177",
"CSAFPID-2633272",
"CSAFPID-2633273",
"CSAFPID-2633268",
"CSAFPID-2633269",
"CSAFPID-2633270",
"CSAFPID-2633271",
"CSAFPID-2633274",
"CSAFPID-2633275",
"CSAFPID-2633276",
"CSAFPID-2633277",
"CSAFPID-2633266",
"CSAFPID-2633267",
"CSAFPID-2633243",
"CSAFPID-2633244",
"CSAFPID-2633245",
"CSAFPID-2633246",
"CSAFPID-2633258",
"CSAFPID-2633261",
"CSAFPID-2633255"
]
}
],
"title": "CVE-2025-29824"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…