Vulnerabilites related to Microsoft - On-Premises Data Gateway
cve-2025-21403
Vulnerability from cvelistv5
Published
2025-01-14 18:04
Modified
2025-04-02 13:23
Severity ?
EPSS score ?
Summary
On-Premises Data Gateway Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | On-Premises Data Gateway |
Version: 1.0.0 < 3000.246 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-21403", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-05T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-06T04:55:44.498Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "On-Premises Data Gateway", vendor: "Microsoft", versions: [ { lessThan: "3000.246", status: "affected", version: "1.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:sap_hana_enabled_sso_for_onpremises_data_gateway:*:*:*:*:*:*:*:*", versionEndExcluding: "3000.246", versionStartIncluding: "1.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2025-01-14T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "On-Premises Data Gateway Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-04-02T13:23:49.984Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "On-Premises Data Gateway Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403", }, ], title: "On-Premises Data Gateway Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2025-21403", datePublished: "2025-01-14T18:04:13.337Z", dateReserved: "2024-12-11T00:29:48.375Z", dateUpdated: "2025-04-02T13:23:49.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-202204-1202
Vulnerability from variot
Microsoft Power BI Spoofing Vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1202", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "on-premises data gateway", scope: "lt", trust: 1, vendor: "microsoft", version: "3000.118.2", }, ], sources: [ { db: "NVD", id: "CVE-2022-23292", }, ], }, cve: "CVE-2022-23292", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "SINGLE", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 3.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "CVE-2022-23292", impactScore: 4.9, integrityImpact: "PARTIAL", severity: "LOW", trust: 1.1, vectorString: "AV:N/AC:H/Au:S/C:P/I:P/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "None", baseScore: 4.3, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2022-23292", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "VHN-412270", impactScore: 2.9, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "HIGH", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "LOW", exploitabilityScore: 1.2, id: "CVE-2022-23292", impactScore: 2.5, integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 2, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, { attackComplexity: "High", attackVector: "Network", author: "NVD", availabilityImpact: "None", baseScore: 3.1, baseSeverity: "Low", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2022-23292", impactScore: null, integrityImpact: "Low", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-23292", trust: 1, value: "LOW", }, { author: "secure@microsoft.com", id: "CVE-2022-23292", trust: 1, value: "LOW", }, { author: "NVD", id: "CVE-2022-23292", trust: 0.8, value: "Low", }, { author: "CNNVD", id: "CNNVD-202204-3199", trust: 0.6, value: "LOW", }, { author: "VULHUB", id: "VHN-412270", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2022-23292", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-412270", }, { db: "VULMON", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "CNNVD", id: "CNNVD-202204-3199", }, { db: "NVD", id: "CVE-2022-23292", }, { db: "NVD", id: "CVE-2022-23292", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Microsoft Power BI Spoofing Vulnerability", sources: [ { db: "NVD", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "VULHUB", id: "VHN-412270", }, { db: "VULMON", id: "CVE-2022-23292", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-23292", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2022-001676", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202204-3199", trust: 0.6, }, { db: "VULHUB", id: "VHN-412270", trust: 0.1, }, { db: "VULMON", id: "CVE-2022-23292", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-412270", }, { db: "VULMON", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "CNNVD", id: "CNNVD-202204-3199", }, { db: "NVD", id: "CVE-2022-23292", }, ], }, id: "VAR-202204-1202", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-412270", }, ], trust: 0.01, }, last_update_date: "2024-11-23T22:47:27.711000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Microsoft Power BI Spoofing Vulnerability Security Update Guide", trust: 0.8, url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23292", }, { title: "Microsoft Power BI Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=243820", }, { title: "CVE-2022-XXXX", trust: 0.1, url: "https://github.com/AlphabugX/CVE-2022-23305 ", }, { title: "CVE-2022-XXXX", trust: 0.1, url: "https://github.com/AlphabugX/CVE-2022-RCE ", }, ], sources: [ { db: "VULMON", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "CNNVD", id: "CNNVD-202204-3199", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "NVD", id: "CVE-2022-23292", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "https://msrc.microsoft.com/update-guide/vulnerability/cve-2022-23292", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23292", }, { trust: 0.8, url: "https://www.ipa.go.jp/security/ciadr/vul/20220413-ms.html", }, { trust: 0.8, url: "https://www.jpcert.or.jp/at/2022/at220010.html", }, { trust: 0.7, url: "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2022-23292", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-23292/", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://github.com/alphabugx/cve-2022-23305", }, ], sources: [ { db: "VULHUB", id: "VHN-412270", }, { db: "VULMON", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "CNNVD", id: "CNNVD-202204-3199", }, { db: "NVD", id: "CVE-2022-23292", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-412270", }, { db: "VULMON", id: "CVE-2022-23292", }, { db: "JVNDB", id: "JVNDB-2022-001676", }, { db: "CNNVD", id: "CNNVD-202204-3199", }, { db: "NVD", id: "CVE-2022-23292", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-04-15T00:00:00", db: "VULHUB", id: "VHN-412270", }, { date: "2022-04-15T00:00:00", db: "VULMON", id: "CVE-2022-23292", }, { date: "2022-05-06T00:00:00", db: "JVNDB", id: "JVNDB-2022-001676", }, { date: "2022-04-12T00:00:00", db: "CNNVD", id: "CNNVD-202204-3199", }, { date: "2022-04-15T19:15:09.797000", db: "NVD", id: "CVE-2022-23292", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-04-21T00:00:00", db: "VULHUB", id: "VHN-412270", }, { date: "2023-06-29T00:00:00", db: "VULMON", id: "CVE-2022-23292", }, { date: "2022-05-06T07:42:00", db: "JVNDB", id: "JVNDB-2022-001676", }, { date: "2023-06-30T00:00:00", db: "CNNVD", id: "CNNVD-202204-3199", }, { date: "2024-11-21T06:48:20.610000", db: "NVD", id: "CVE-2022-23292", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202204-3199", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Microsoft On-Premises Data Gateway Spoofed vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2022-001676", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202204-3199", }, ], trust: 0.6, }, }