Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-27446 (GCVE-0-2026-27446)
Vulnerability from cvelistv5 – Published: 2026-03-04 08:48 – Updated: 2026-05-12 12:08- CWE-306 - Missing Authentication for Critical Function
| URL | Tags |
|---|---|
| https://lists.apache.org/thread/jwpsdc8tdxotm98od… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache Artemis |
Affected:
2.50.0 , ≤ 2.51.0
(semver)
|
|
| Apache Software Foundation | Apache ActiveMQ Artemis |
Affected:
2.11.0 , ≤ 2.44.0
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-03-05T04:33:58.767Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/03/04/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2026/03/03/4"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-27446",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-04T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-05T04:55:45.957Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"affected": [
{
"defaultStatus": "unknown",
"product": "Opcenter RDnL",
"vendor": "Siemens",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-12T12:08:57.564Z",
"orgId": "0b142b55-0307-4c5a-b3c9-f314f3fb7c5e",
"shortName": "siemens-SADP"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-085541.html"
}
],
"x_adpType": "supplier"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.artemis:artemis-server",
"product": "Apache Artemis",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThanOrEqual": "2.51.0",
"status": "affected",
"version": "2.50.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.activemq:artemis-server",
"product": "Apache ActiveMQ Artemis",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThanOrEqual": "2.44.0",
"status": "affected",
"version": "2.11.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Hardik Mehta \u003cmehtahardik@proton.me\u003e"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMissing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\u003c/p\u003e\u003cp\u003e- incoming Core protocol connections from untrusted sources to the broker\u003c/p\u003e\u003cp\u003e- outgoing Core protocol connections from the broker to untrusted targets\u003c/p\u003e\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003e- Apache Artemis from 2.50.0 through 2.51.0\u003c/p\u003e\u003cp\u003e- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\u003c/p\u003e\u003cp\u003eThe issue can be mitigated by one of the following:\u003c/p\u003e\u003cp\u003e- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \"artemis\" acceptor listening on port 61616. See the \"protocols\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\u003c/p\u003e\u003cp\u003e- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\u003c/p\u003e\u003cp\u003e- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u0026nbsp;0xfffffff0. Documentation for interceptors is available at\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html\"\u003ehttps://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html\u003c/a\u003e.\u003c/p\u003e"
}
],
"value": "Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\n\n- incoming Core protocol connections from untrusted sources to the broker\n\n- outgoing Core protocol connections from the broker to untrusted targets\n\nThis issue affects:\n\n- Apache Artemis from 2.50.0 through 2.51.0\n\n- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\n\nUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\n\nThe issue can be mitigated by one of the following:\n\n- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \"artemis\" acceptor listening on port 61616. See the \"protocols\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\n\n- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\n\n- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u00a00xfffffff0. Documentation for interceptors is available at\u00a0 https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html ."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"other": {
"content": {
"text": "critical"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-17T15:29:53.714Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg"
}
],
"source": {
"defect": [
"ARTEMIS-5928"
],
"discovery": "EXTERNAL"
},
"title": "Apache Artemis, Apache ActiveMQ Artemis: Auth bypass for Core downstream federation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2026-27446",
"datePublished": "2026-03-04T08:48:48.199Z",
"dateReserved": "2026-02-19T16:10:53.921Z",
"dateUpdated": "2026-05-12T12:08:57.564Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-27446",
"date": "2026-05-13",
"epss": "0.00156",
"percentile": "0.35927"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-27446\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2026-03-04T09:15:56.837\",\"lastModified\":\"2026-05-12T13:17:33.067\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\\n\\n- incoming Core protocol connections from untrusted sources to the broker\\n\\n- outgoing Core protocol connections from the broker to untrusted targets\\n\\nThis issue affects:\\n\\n- Apache Artemis from 2.50.0 through 2.51.0\\n\\n- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\\n\\nUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\\n\\nThe issue can be mitigated by one of the following:\\n\\n- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \\\"artemis\\\" acceptor listening on port 61616. See the \\\"protocols\\\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\\n\\n- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\\n\\n- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u00a00xfffffff0. Documentation for interceptors is available at\u00a0 https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Autenticaci\u00f3n Faltante para Funci\u00f3n Cr\u00edtica (CWE-306) en Apache Artemis, Apache ActiveMQ Artemis. Un atacante remoto no autenticado puede usar el protocolo Core para forzar a un broker objetivo a establecer una conexi\u00f3n de federaci\u00f3n Core saliente con un broker malicioso controlado por el atacante. Esto podr\u00eda resultar potencialmente en la inyecci\u00f3n de mensajes en cualquier cola y/o la exfiltraci\u00f3n de mensajes de cualquier cola a trav\u00e9s del broker malicioso. Esto afecta a entornos que permiten ambos:\\n\\n- conexiones de protocolo Core entrantes desde fuentes no confiables al broker\\n\\n- conexiones de protocolo Core salientes desde el broker a objetivos no confiables\\n\\nEste problema afecta a:\\n\\n- Apache Artemis desde 2.50.0 hasta 2.51.0\\n\\n- Apache ActiveMQ Artemis desde 2.11.0 hasta 2.44.0.\\n\\nSe recomienda a los usuarios actualizar a la versi\u00f3n 2.52.0 de Apache Artemis, que corrige el problema.\\n\\nEl problema puede mitigarse mediante cualquiera de las siguientes opciones:\\n\\n- Eliminar el soporte del protocolo Core de cualquier aceptor que reciba conexiones de fuentes no confiables. Las conexiones de protocolo Core entrantes son compatibles por defecto a trav\u00e9s del aceptor \u0027artemis\u0027 que escucha en el puerto 61616. Consulte el par\u00e1metro URL \u0027protocols\u0027 configurado para el aceptor. Una URL de aceptor sin este par\u00e1metro soporta todos los protocolos por defecto, incluyendo Core.\\n\\n- Usar SSL bidireccional (es decir, autenticaci\u00f3n basada en certificados) para forzar a cada cliente a presentar el certificado SSL adecuado al establecer una conexi\u00f3n antes de que se intente cualquier handshake de protocolo de mensajes. Esto evitar\u00e1 la explotaci\u00f3n no autenticada de esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"LOW\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.11.0\",\"versionEndIncluding\":\"2.44.0\",\"matchCriteriaId\":\"6BC62090-71FA-45A2-A519-B2C3B47D4262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:artemis:2.50.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF62B6D-CD60-43D0-9740-AC011CC1FBFF\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/03/03/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/03/04/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-085541.html\",\"source\":\"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/03/04/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2026/03/03/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-03-05T04:33:58.767Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-27446\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-04T18:54:49.382178Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-04T18:55:07.149Z\"}}], \"cna\": {\"title\": \"Apache Artemis, Apache ActiveMQ Artemis: Auth bypass for Core downstream federation\", \"source\": {\"defect\": [\"ARTEMIS-5928\"], \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Hardik Mehta \u003cmehtahardik@proton.me\u003e\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 9.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"LOW\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"LOW\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"critical\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Artemis\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.50.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.51.0\"}], \"packageName\": \"org.apache.artemis:artemis-server\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache ActiveMQ Artemis\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.44.0\"}], \"packageName\": \"org.apache.activemq:artemis-server\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\\n\\n- incoming Core protocol connections from untrusted sources to the broker\\n\\n- outgoing Core protocol connections from the broker to untrusted targets\\n\\nThis issue affects:\\n\\n- Apache Artemis from 2.50.0 through 2.51.0\\n\\n- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\\n\\nUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\\n\\nThe issue can be mitigated by one of the following:\\n\\n- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \\\"artemis\\\" acceptor listening on port 61616. See the \\\"protocols\\\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\\n\\n- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\\n\\n- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\\u00a00xfffffff0. Documentation for interceptors is available at\\u00a0 https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eMissing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\u003c/p\u003e\u003cp\u003e- incoming Core protocol connections from untrusted sources to the broker\u003c/p\u003e\u003cp\u003e- outgoing Core protocol connections from the broker to untrusted targets\u003c/p\u003e\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003e- Apache Artemis from 2.50.0 through 2.51.0\u003c/p\u003e\u003cp\u003e- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\u003c/p\u003e\u003cp\u003eThe issue can be mitigated by one of the following:\u003c/p\u003e\u003cp\u003e- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \\\"artemis\\\" acceptor listening on port 61616. See the \\\"protocols\\\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\u003c/p\u003e\u003cp\u003e- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\u003c/p\u003e\u003cp\u003e- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u0026nbsp;0xfffffff0. Documentation for interceptors is available at\u0026nbsp;\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html\\\"\u003ehttps://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html\u003c/a\u003e.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-306\", \"description\": \"CWE-306 Missing Authentication for Critical Function\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2026-03-17T15:29:53.714Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-27446\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-17T15:29:53.714Z\", \"dateReserved\": \"2026-02-19T16:10:53.921Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2026-03-04T08:48:48.199Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
NCSC-2026-0147
Vulnerability from csaf_ncscnl - Published: 2026-05-13 06:33 - Updated: 2026-05-13 06:33Multiple U-Boot versions, including DENX and Das U-Boot through 2019.07-rc4, contain vulnerabilities such as infinite recursion from crafted DOS partition tables causing crashes, alongside numerous CVEs from 2019-2020 affecting bootloader functionality and security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
U-Boot versions 2016.11-rc1 through 2019.07-rc4 contain multiple security vulnerabilities, including a memcpy() underflow and stack buffer overflow triggered by crafted ext4 filesystems, addressed by CVE-2019-13106 and CVE-2019-13104.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple U-Boot versions from 2016.09 to 2019.07-rc4 contain critical security vulnerabilities including stack buffer overflow and memcpy() underflow related to crafted ext4 filesystems, enabling potential code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an integer underflow causing unbounded memcpy in net_process_received_packet during UDP parsing, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an unbounded memcpy in Das U-Boot's nfs_readlink_reply function before version 2019.07, were addressed across various updates fixing numerous CVEs and improving hardware compatibility and functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an unbounded memcpy in the NFSv2 nfs_read_reply function, were addressed in Das U-Boot through updates fixing numerous CVEs and improving hardware support and network boot functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot's nfs_readlink_reply function prior to version 2019.07, along with various CVEs affecting network boot, USB, EFI, and descriptor handling, were addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including unbounded memcpy in Das U-Boot up to version 2019.07 and various CVEs such as CVE-2019-13106, CVE-2019-11059, and CVE-2020-10648 were addressed in updates improving network boot, USB, and EFI support.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including out-of-bounds read issues in the nfs_read_reply function, were addressed in Das U-Boot up to version 2019.07 through updates fixing numerous CVEs and improving hardware compatibility and functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot's nfs_read_reply function and various CVEs affecting network boot, USB, and EFI support on ARM platforms have been addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot through version 2019.07 contains multiple security vulnerabilities including an integer underflow causing unbounded memcpy in UDP packet handling, with fixes addressing numerous CVEs from 2019 and 2020 alongside various functional improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot through version 2019.07 contains multiple security vulnerabilities including a stack-based buffer overflow in the nfs_handler reply helper function rpc_lookup_reply, with updates addressing numerous CVEs and various hardware and network boot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack-based buffer overflows in the nfs_lookup_reply function, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and other hardware-related issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including stack-based buffer overflows in the nfs_readlink_reply function and various CVEs affecting Das U-Boot through version 2019.07 have been addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07 have been addressed, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07, have been addressed in updates that also fix network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple U-Boot updates through 2020 address numerous security vulnerabilities including verified boot bypass, arbitrary code execution, and signature verification flaws, alongside fixes for hardware compatibility and network boot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
The U-Boot DFU implementation contains a vulnerability where an unchecked USB DFU download length field allows a physical attacker to write beyond a heap buffer by specifying a wLength greater than 4096 bytes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot, including buffer overflows and arbitrary out-of-bounds writes during IP packet defragmentation and i2c md command processing, can cause denial of service and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot, including buffer overflows and out-of-bounds writes (CVE-2022-30552, CVE-2022-30790, CVE-2022-30767, CVE-2022-34835), affect components like IP defragmentation and i2c md command, impacting EcoStruxure™ Panel Server Box and other systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot through 2022.07-rc5 include a stack-based buffer overflow in the 'i2c md' command due to an integer signedness error, heap overflow in squashfs, and out-of-bounds writes in IP defragmentation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in QEMU, including heap buffer overflow, use-after-free, NULL pointer dereference, DMA reentrancy, and integer overflow, affect various components such as e1000e NIC emulation and Virtio, leading to denial of service, data disclosure, and potential code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Python updates address critical vulnerabilities including incorrect parsing of email addresses with special characters (CVE-2023-27043), timing side channels in HMAC comparison, and other security flaws affecting versions up to 3.11.12 with extensive fixes and improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
This QEMU update addresses multiple critical security vulnerabilities including heap buffer overflows, use-after-free, NULL pointer dereferences, DMA reentrancy double free, and information leaks affecting various versions and NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A missing type check in PDF.js font handling in Mozilla Firefox, Firefox ESR, and Thunderbird allows arbitrary JavaScript execution, affecting versions prior to Firefox 126, ESR 115.11, and Thunderbird 115.11.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Linux PAM versions prior to 1.6.0, including the pam_namespace module, contain local denial of service vulnerabilities due to improper handling of mkfifo and missing O_DIRECTORY flag in openat calls, with additional security flaws found in Red Hat OpenShift and IBM QRadar SIEM components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
SUSE Linux Enterprise 15 SP5 and SP6 kernels, including Confidential Computing, Azure, RT, and Micro variants, received extensive security and non-security updates addressing vulnerabilities across networking, memory, filesystems, device drivers, graphics, and multiple architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of SIPROTEC 5 devices are vulnerable to brute force attacks on insufficiently random session identifiers, allowing unauthenticated remote attackers to gain unauthorized read access to limited web server information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple integer overflow vulnerabilities in Das U-Boot before 2025.01-rc1 affect ext4 symlink resolution, inode size handling, DHCP response processing, and memory allocation, potentially leading to memory corruption and arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot before version 2025.01-rc1 contains multiple integer overflow vulnerabilities in memory allocation, ext4 symlink resolution, and squashfs filesystem handling, potentially leading to crashes or arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security and non-security fixes were applied across various SUSE Linux Enterprise kernels, addressing numerous vulnerabilities in networking, filesystems, Bluetooth, and other kernel subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernels, including versions 12, 15 (SP3 to SP7), Micro 6.x, and Azure variants, received extensive security updates addressing vulnerabilities in Bluetooth, networking, filesystems, USB, SCSI, memory management, and hardware drivers, alongside a Linux kernel TLS decryption refactor to improve processing correctness.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including a buffer overflow in glibc's assert() function (CVE-2025-0395) affect GNU C Library versions 2.13 to 2.40 and various products like NetApp, Oracle Communications, and HPE Brocade, leading to potential DoS, data modification, and unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in MIT Kerberos 5 (CVE-2025-3576) allows spoofing of GSSAPI-protected messages via weaknesses in the RC4-HMAC-MD5 checksum, leading to disabling of weak ciphers like des3-cbc-sha1 and arcfour-hmac-md5 by default.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A set of vulnerabilities in linux-pam's pam_namespace module, including symlink and race condition flaws, allow local users to escalate privileges to root and cause information disclosure or denial of service, addressed by updates changing path handling and disabling user .pam_environment file reading.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including integer overflows, stack buffer overflows, heap use-after-free, type confusion, and null pointer dereferences, can lead to denial of service or crashes, affecting versions up to 2.14.3 and related Oracle products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in GLib's GString, including integer overflow and buffer underflow (CVE-2025-6052, CVE-2025-4373), and a difficult-to-exploit Java SE 8u471-b50 JavaFX flaw can cause crashes, memory corruption, or partial denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A heap use-after-free vulnerability in libxslt caused by attribute type flag corruption leads to memory corruption, crashes, and potential code execution, affecting libxml2, Oracle Java SE 8u471-b50, and Oracle Communications Cloud Native Core Certificate Management with CVSS scores up to 7.8.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including excessive resource allocation, denial of service, injection flaws, and information disclosure affect Bouncy Castle Java libraries, Oracle Communications, Oracle Siebel CRM, Oracle Fusion Middleware, HPE Telco Service Activator, and various Ubuntu LTS versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including CVE-2025-9230 cause out-of-bounds read/write in RFC 3211 KEK unwrap during CMS password-based decryption, potentially leading to crashes or code execution, with moderate severity and low exploit likelihood due to rare usage.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including a timing side-channel in the SM2 algorithm on 64-bit ARM platforms, memory handling flaws, and denial of service issues affect OpenSSL, Oracle PeopleSoft, Oracle JD Edwards, and NetApp products, with moderate severity in some cases.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities, including an out-of-bounds read in the HTTP client 'no_proxy' handling causing denial of service, affect various products such as Oracle Essbase, PeopleSoft, JD Edwards, SAP NetWeaver, and NetApp, with severity ranging from low to moderate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Libxml2 versions up to 2.9.14 contain infinite recursion vulnerabilities in exsltDynMapFunction and catalog parsing functions, causing stack exhaustion and local denial of service without arbitrary memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
GnuTLS versions prior to 3.8.11 contain buffer overflow vulnerabilities in gnutls_pkcs11_token_init and issues with malicious certificates and PKCS11 token labels, leading to denial of service and potential arbitrary code execution (CVE-2025-9820, CVE-2025-14831).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A memory corruption vulnerability in applications parsing specially crafted IPT files may enable attackers to execute arbitrary code within the affected process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
GnuTLS versions prior to 3.8.12 contain vulnerabilities including CVE-2025-14831, causing denial of service via excessive CPU and memory use from malicious certificates with many name constraints and SANs, and CVE-2025-9820, related to crashes or potential code execution from PKCS11 token label mishandling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in Go's net/http package allows acceptance of chunked data with bare LF line terminators, enabling HTTP request smuggling when combined with other misinterpreting servers, affecting multiple Go versions prior to 1.23.8 and 1.24.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various architectures and subsystems were fixed, including null pointer dereferences and privilege escalation risks, to enhance system security and prevent local attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernels, including 15 SP6, 15 SP7, and Micro 6.x versions, received extensive security and non-security updates addressing vulnerabilities in networking, filesystems, drivers, CPU cache initialization, AMD processors, and various kernel subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including use-after-free flaws and memory corruption in WebKitGTK, Safari 18.5, and Oracle Java SE JavaFX were fixed through improved memory handling and updates addressing crashes, data exfiltration, and remote code execution risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise and Micro kernel versions received extensive security updates addressing numerous vulnerabilities across CPU cache initialization, AMD processors, filesystems including btrfs, drivers, and various kernel subsystems, alongside many non-security bug fixes and improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to SUSE Linux Enterprise kernels, including 15 SP6, SP7, Micro, Azure, Confidential Computing, and RT variants, addressed numerous security vulnerabilities and bugs across diverse subsystems such as media, networking, tracing, filesystems, drivers, and CPU architectures including AMD processors and the VMSCAPE flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and non-security bugs affecting various Linux kernel subsystems, including CPU cache initialization flaws, AMD processor data leakage, and a Linux kernel crash on RaptorLake CPUs, were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including a f2fs filesystem inode sanity check fix, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were addressed across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including atomicity issues in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update fixed multiple critical vulnerabilities including out-of-bounds access in cgroup local storage via BPF, AppArmor LSM flaws, AMD CPU microcode loading issues, and the VMSCAPE branch predictor isolation vulnerability across various architectures and subsystems.
CWE-125 - Out-of-bounds Read| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including race conditions in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw and CPU cache initialization issues, were addressed in various Linux kernel versions across SUSE Linux Enterprise and Linux Micro products, with fixes spanning numerous architectures, subsystems, and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including arm64 stack switching, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw—were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack buffer overflows, CPU cache initialization flaws, and the VMSCAPE branch predictor isolation issue, were fixed across various Linux kernel components and SUSE Linux Enterprise products to enhance system security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update fixed multiple security vulnerabilities including out-of-boundary access in the f2fs filesystem, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including the media: venus driver, CPU cache initialization, AMD processors, and numerous drivers, were addressed through extensive patches in SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, uvcvideo driver, AppArmor module, and branch predictor isolation (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions to address out-of-bounds reads, privilege escalation, data leakage, and system integrity issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including a race condition in ptdump and the VMSCAPE flaw in branch predictor isolation, were addressed across SUSE Linux Enterprise and Micro kernels from 15 SP6 to 16.0 and 6.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates for SUSE Linux Enterprise and Micro versions address numerous security vulnerabilities and non-security bugs across various subsystems including networking, filesystems, drivers, AMD processor issues, and kernel panic fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures and subsystems, including a NULL pointer dereference in net/sched ets, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel across various SUSE Linux Enterprise versions and architectures were fixed, including issues in fbdev, Bluetooth, networking, filesystems, device drivers, AMD processors, virtualization, and memory management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and AMD processors—including race conditions, use-after-free errors, CPU cache initialization flaws, and branch predictor isolation issues—were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems and architectures, including AMD CPU flaws, pNFS layout issues, and the VMSCAPE branch predictor isolation flaw, were addressed across SUSE Linux Enterprise and Micro kernel versions with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors, Linux kernel subsystems, and the VMSCAPE flaw in branch predictor isolation were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like null pointer dereferences, race conditions, use-after-free, and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems—including memory management, networking, USB, SCSI, and CPU cache initialization—were addressed across SUSE Linux Enterprise and Micro kernel versions with numerous CVE fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors, Linux kernel subsystems, and drivers—including a null pointer dereference in the SCSI lpfc driver and the VMSCAPE branch predictor isolation flaw—were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various CPU architectures and Linux kernel subsystems, including MIPS stack handling, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed to prevent crashes, privilege escalation, and data leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including a critical out-of-bounds access flaw in the jfs filesystem and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to the Linux kernel and SUSE Linux Enterprise products addressed numerous critical security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and filesystems, including fixes for data leakage, memory corruption, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others addressed critical vulnerabilities including a double-free flaw in the scsi bfa driver, CPU cache initialization issues on AMD processors, the VMSCAPE vulnerability, race conditions, and use-after-free bugs across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across various architectures, subsystems, and drivers, including fixes for AMD CPU cache issues, iSER setup panics, and VMSCAPE branch predictor flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities including a branch predictor isolation flaw (VMSCAPE), CPU cache initialization issues, AMD processor data leaks, and ext4 filesystem error handling improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including fbdev, memory management, networking, schedulers, and hardware drivers, were addressed across SUSE Linux Enterprise and Micro kernel versions to prevent buffer overflows, data leakage, and privilege escalation.
CWE-787 - Out-of-bounds Write| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including null pointer dereference, CPU cache initialization flaws, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were discovered and fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple security vulnerabilities across various subsystems and architectures, including fixes for the NTFS3 file system, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple security vulnerabilities across various architectures and subsystems, including fixes for DRBD use-after-free, AMD CPU cache flaws, AppArmor LSM issues, and the VMSCAPE branch predictor isolation vulnerability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures, drivers, and subsystems—including a deadlock in SMB server, AMD CPU issues, SEV-SNP memory integrity flaws, and the VMSCAPE branch predictor isolation vulnerability—were fixed to enhance system security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw, CPU cache initialization issues, and memory management bugs, were fixed across various Linux kernel versions and SUSE Enterprise products affecting numerous architectures and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including slab-out-of-bounds reads, use-after-free, race conditions, memory leaks, CPU cache initialization flaws, AMD processor data leakage, and the critical VMSCAPE branch predictor isolation flaw were fixed across various Linux kernel subsystems in SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including a slab-out-of-bounds issue in the Linux kernel's hfsplus_bnode_read() function and the VMSCAPE flaw affecting branch predictor isolation, were fixed across various SUSE Linux Enterprise and Linux kernel versions impacting numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems including HFS filesystem, coresight, sched, usb, scsi, KVM, netfilter, and others were fixed across SUSE Linux Enterprise and Micro kernels to prevent memory access violations, data leakage, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including a refcount leak in netfilter, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue were fixed across various Linux kernel versions and SUSE Enterprise products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in the Linux kernel's LoongArch BPF implementation caused incorrect jump offset calculations in tail calls, leading to soft lockups, which was fixed by correcting the JIT context initialization and offset calculation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including use-after-free, race conditions, CPU cache flaws, and branch predictor isolation issues, were addressed across SUSE Linux Enterprise and Micro kernels with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions, including SUSE Enterprise and Micro kernels, were addressed, covering issues in drivers, filesystems, CPU architectures (notably AMD), and virtualization subsystems such as the VMSCAPE flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting Linux kernel components including netlink, schedulers, drivers, memory management, and GPU subsystems were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including slab out-of-bounds in the smb3 subsystem, CPU cache initialization flaws, and AMD processor data leakage, were fixed across various SUSE Linux Enterprise versions and NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems were addressed, including issues like race conditions, memory leaks, use-after-free bugs, CPU cache initialization flaws, and branch predictor isolation (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions and SUSE Linux Enterprise products, including issues like destination refcount leaks, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting SUSE Linux Enterprise kernels, including AMD processors, AppArmor LSM, and various kernel subsystems and drivers, were fixed to prevent kernel crashes, privilege escalation, data leaks, and integrity loss.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security fixes were applied across various SUSE Linux Enterprise and Micro kernel versions, addressing vulnerabilities such as race conditions, use-after-free bugs, memory leaks, null pointer dereferences, and a specific fix in the Linux kernel asix_devices USB network driver for PHY address masking.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and race conditions affecting various Linux kernel subsystems, including ppp, scsi, net, drm, ACPI, and critical AMD CPU and SEV-SNP memory integrity issues, were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across numerous subsystems and architectures, including null pointer dereferences, CPU cache initialization flaws, data leakage, and branch predictor isolation issues, were identified and addressed in various SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Linux Enterprise and Micro versions, addressed numerous critical security vulnerabilities across various subsystems, drivers, and architectures, such as CPU cache initialization, AMD processor data leakage, and the VMSCAPE flaw involving branch predictor isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw—were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernel updates address numerous security vulnerabilities including buffer overflows, use-after-free, race conditions, TLS zero-length record handling, malicious packet rejection, and constant-time MAC comparison across various subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others addressed numerous security vulnerabilities including KASAN slab-out-of-bounds, CPU cache initialization flaws, AMD processor data leakage, VMSCAPE branch predictor isolation, and local privilege escalation in AppArmor LSM across various kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, SEV-SNP guest memory, and the VMSCAPE branch predictor flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive fixes in numerous subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including drivers, filesystems, networking, and virtualization components, were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like race conditions, use-after-free, memory leaks, and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting various Linux kernel versions and subsystems, including AMD processor flaws, race conditions, use-after-free bugs, and the VMSCAPE vulnerability, were fixed across SUSE Linux Enterprise and Linux Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems—including the iio light as73211 driver and the VMSCAPE branch predictor isolation flaw—were fixed to prevent data leakage and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems—including ftrace use-after-free bugs, AMD processor data leakage, SEV-SNP memory integrity, and VMSCAPE branch predictor isolation—were fixed across SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and CPU cache initialization issues, were fixed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and Micro products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel security updates addressed numerous vulnerabilities including improper CPU cache initialization affecting AMD processors and SEV-SNP guest memory, alongside fixes for local privilege escalation in AppArmor and kernel subsystem issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including drm/amd/display, AMD CPU cache, AppArmor LSM, and virtualization branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including s390/sclp, AMD CPU cache initialization, AppArmor, and others, were fixed across SUSE Linux Enterprise and Micro products, addressing issues such as improper memory access and data leakage.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including race conditions, use-after-free flaws, and branch predictor isolation issues, were identified and fixed across various Linux kernel subsystems and architectures, notably affecting SUSE Linux Enterprise and Micro distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel components, including ACPI's pfr_update driver, AMD processors, and SEV-SNP guest memory integrity, were discovered and addressed across SUSE Linux Enterprise and Micro kernel versions with extensive fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple severe security vulnerabilities affecting various Linux kernel subsystems, including ipv6: sr MAC timing attacks, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including HSR network protocol, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels with extensive updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and architectures, including fixes for KFD debugfs, AppArmor LSM, and SEV-SNP guest memory issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems and AMD processors, including critical CPU cache initialization flaws, data leakage, and the VMSCAPE branch predictor isolation issue, were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and stability issues affecting various Linux kernel subsystems, architectures, and AMD processors were addressed across SUSE Linux Enterprise and Micro kernels, including fixes for the media: venus driver and the VMSCAPE vulnerability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel components, including AMD CPU data leakage, race conditions, and branch predictor isolation flaws, were fixed across SUSE Linux Enterprise and Linux kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, CPU architectures including AMD processors, and drivers were fixed across SUSE Linux Enterprise and Micro kernels, including a critical VMSCAPE flaw involving branch predictor isolation between guest VMs and hypervisors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures and subsystems, including parisc, CPU cache initialization, AMD processor data leakage, and AppArmor, were addressed to prevent unauthorized access and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures, including parisc and AMD processors, were fixed, addressing issues such as improper CPU cache initialization, data leakage, and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including vsock/virtio SKB overflow, CPU cache initialization flaws, and AMD processor data leakage, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive security and stability updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including out-of-bounds array access in the bno055 IMU driver and improper CPU cache initialization, were addressed in updates to SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, including AMD CPU data leakage, SEV-SNP guest memory integrity, and the VMSCAPE branch predictor flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
The Linux kernel addressed multiple security vulnerabilities across various architectures and subsystems, including AMD CPU cache flaws, the VMSCAPE branch predictor isolation issue, and deadlock fixes related to kmemleak_lock and netpoll interactions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
This Linux kernel update addresses multiple security vulnerabilities across various architectures and subsystems, including AMD CPU data leakage, SEV-SNP memory integrity flaws, VMSCAPE branch predictor isolation issues, and a soft lockup fix in kmemleak cleanup.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including btrfs subvolume relocation, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE Linux Enterprise and others address a wide range of security vulnerabilities including divide-by-zero errors, race conditions, use-after-free, null pointer dereferences, information leaks, and CPU cache initialization flaws across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting Linux kernel subsystems, drivers, filesystems, and architectures—including the VMSCAPE flaw and CPU cache and AMD processor issues—were fixed across SUSE Linux Enterprise and Micro product lines.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including data races in RCU, branch predictor isolation (VMSCAPE), AMD processor data leakage, and AppArmor flaws—were addressed through extensive patches across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addresses multiple security vulnerabilities including ARM rockchip SMP initialization hangs, CPU cache initialization flaws, AMD processor data leaks, AppArmor LSM privilege escalations, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE Linux Enterprise and related distributions address critical security vulnerabilities across file descriptor allocation, networking, device drivers, CPU cache initialization, AMD processor data leakage, and branch predictor isolation flaws affecting various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, addressed numerous security vulnerabilities such as memory leaks, race conditions, use-after-free bugs, AMD processor data leakage, and a VM branch predictor isolation flaw (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and race conditions in the Linux kernel, including btrfs qgroup use-after-free and AMD SEV-SNP guest memory issues, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems, including USB, Bluetooth, and virtualization, were addressed in updates for SUSE Linux Enterprise and related distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and drivers—including CPU cache initialization flaws, AMD data leakage, and the VMSCAPE branch predictor isolation issue—were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel versions, including SUSE Linux Enterprise and Micro kernels, were addressed, covering issues in IPv6 TSO handling, CPU cache initialization, AMD processor data leakage, and numerous subsystems such as coresight, schedulers, USB, SCSI, networking, and filesystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, AMD processors, and virtualization components were addressed across various SUSE Linux Enterprise and Micro kernel versions, including fixes for NULL pointer dereferences, race conditions, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including timer overflow, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel vulnerabilities were fixed, including memory corruption in debug_vm_pgtable, CPU cache initialization flaws, AMD processor data leakage, AppArmor LSM issues, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel components, including CPU architectures, drivers, filesystems, and subsystems such as jbd2_log_do_checkpoint and branch predictor isolation (VMSCAPE), were identified and addressed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors, including use-after-free bugs, CPU data leakage, SEV-SNP memory integrity issues, and the VMSCAPE flaw in branch predictor isolation, were fixed across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, drivers, and subsystems—including MDT loader buffer validation, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE)—were identified and addressed in SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel subsystems, including scsi: ufs: exynos driver, CPU cache initialization, AMD processor data leakage, and branch predictor isolation, were fixed across SUSE Linux Enterprise and other kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, including the MHI host driver, CPU cache initialization, AMD processors, and branch predictor isolation (VMSCAPE), were identified and patched across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others fixed numerous security vulnerabilities including ARM Tegra I/O memcpy issues, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE vulnerability across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple critical security vulnerabilities, including CPU cache memory initialization flaws, AMD processor data leakage, the VMSCAPE vulnerability, and various issues across numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous critical security vulnerabilities including memory leaks, race conditions, use-after-free bugs, CPU cache and AMD processor flaws, and the VMSCAPE vulnerability affecting virtualization isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including btrfs metadata corruption, AMD processor flaws, and various subsystems such as memory management, networking, and drivers, were fixed across SUSE Linux Enterprise and Micro products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including USB, networking, filesystems, and drivers, were identified and fixed across SUSE Linux Enterprise and Micro kernels, alongside a VMSCAPE flaw impacting branch predictor isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including HID multitouch, AppArmor, coresight, sched, USB, SCSI, KVM, and AMD processors, were identified and addressed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including a page fault in the hid-ntrig driver, flaws in AppArmor LSM, the VMSCAPE branch predictor isolation issue, and AMD Zen processor EntrySign flaw, were addressed across various SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across networking, filesystems, drivers, and subsystems including critical AppArmor LSM flaws and a branch predictor isolation issue (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions in ftrace, flaws in AppArmor LSM, AMD CPU microcode verification issues, and the VMSCAPE branch predictor isolation vulnerability across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various subsystems such as efivarfs, crypto, bpf, cifs, and architectures were fixed, including slab-out-of-bounds, use-after-free, race conditions, and CPU microcode verification flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to SUSE Linux Enterprise kernels address numerous security vulnerabilities including inconsistent reference count handling in SMB filesystem, AppArmor LSM privilege escalations, and AMD Zen CPU microcode verification flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates across SUSE Linux Enterprise and Micro versions addressed numerous security vulnerabilities including speculative execution side-channel mitigations, AppArmor LSM flaws, AMD CPU microcode issues, and branch predictor isolation (VMSCAPE), affecting various subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free in the ASUS HID driver, AppArmor LSM flaws, VMSCAPE branch predictor isolation, and CPU microcode signature issues in AMD Zen processors, affect various Linux kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions, use-after-free bugs, memory leaks, and critical flaws in the AppArmor LSM and AMD Zen CPU microcode verification across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including race conditions, use-after-free bugs, privilege escalations, denial of service, and information leaks were fixed across various Linux kernel subsystems and the AppArmor LSM in SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, address numerous security vulnerabilities such as slab-use-after-free, privilege escalation, denial of service, and information leaks across various subsystems, drivers, and architectures, with notable fixes in AppArmor LSM and AMD Zen microcode verification.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities, including flaws in the Linux kernel's ATM TCP driver, AppArmor LSM, and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including XFS filesystem, AppArmor LSM, AMD processors, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels to prevent system crashes, privilege escalation, and data exposure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, and privilege escalation flaws in the Linux kernel and AppArmor module were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels, as well as AMD processor microcode.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions and subsystems, including batman-adv, AppArmor, and AMD processors, were identified and fixed, addressing issues such as out-of-bounds reads/writes, race conditions, use-after-free, and information exposure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting various Linux kernel subsystems, including SCSI drivers, AppArmor security module, memory management, and a branch predictor isolation flaw (VMSCAPE), were addressed in updates for SUSE Linux Enterprise and Linux kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including null pointer dereferences in ocfs2, AppArmor LSM privilege escalations, and AMD Zen microcode flaws were fixed across various SUSE Linux Enterprise and Micro kernel versions, addressing memory leaks, race conditions, and driver issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM, including a deadlock in the SLUB allocator and AMD CPU microcode verification flaws, were fixed to prevent denial of service, privilege escalation, and information leaks across numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including AppArmor, memory management, drivers, and AMD processors, were discovered and addressed across SUSE Linux Enterprise and Micro kernels, involving privilege escalation, denial of service, and information exposure risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting Linux kernel subsystems, including AppArmor LSM, x86/mm/64 paging, and AMD processors, were addressed in various SUSE Linux Enterprise and Micro kernel updates to fix privilege escalation, memory leaks, race conditions, and system crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, race conditions, use-after-free, memory leaks, and privilege escalation flaws were addressed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including memory leaks, privilege escalation, denial of service, and information leaks, were identified and fixed across various Linux kernel subsystems, drivers, and architectures, notably affecting SUSE Linux Enterprise and AppArmor modules.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and regressions affecting the Linux kernel, including the AppArmor security module, AMD CPU microcode verification, and subsystems like coresight, sched, usb, scsi, and netfilter, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including a critical SSID length bounds check fix in cfg80211, numerous AppArmor LSM flaws, and a critical AMD Zen CPU microcode signature verification issue, were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including the i40e driver, AppArmor LSM, and AMD CPU microcode, were fixed across various SUSE Linux Enterprise and Micro kernel versions to address privilege escalation, denial of service, and information leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, race conditions, memory leaks, use-after-free bugs, and flaws in the AppArmor Linux kernel Security Module and AMD Zen microcode verification were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including use-after-free in Bluetooth, flaws in AppArmor LSM, branch predictor isolation (VMSCAPE), and AMD Zen CPU microcode loading were fixed across various Linux kernel versions and SUSE Enterprise products to address privilege escalation, denial of service, and information leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and issues in AppArmor LSM and AMD CPU microcode verification, were identified and fixed across various Linux kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address critical security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, branch predictor isolation flaws (VMSCAPE), and AMD CPU microcode signature verification issues across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address critical security vulnerabilities including use-after-free, race conditions, privilege escalation, denial of service, information leaks, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates address the VMSCAPE vulnerability and numerous other security issues including memory leaks, use-after-free, race conditions, and hardware-specific bugs across various subsystems and SUSE Linux Enterprise product lines.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices exhibit a null pointer dereference vulnerability in processing specific IPv4 requests, which can lead to a denial of service condition requiring manual system restart.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in multiple BluePlanet device models allows attackers to derive Technical Service credentials from device serial numbers using a CRC16-based algorithm, enabling unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in multiple RUGGEDCOM ROX device models below version V2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges due to improper sanitization of user input during feature key installation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to read arbitrary files with root privileges via improper input validation in the web server's JSON-RPC interface.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A command injection vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges via the Scheduler functionality in the Web UI.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple use-after-free vulnerabilities and memory management issues in WebKitGTK, Safari, iOS, iPadOS, macOS, and Oracle Java SE 8u471-b50 were fixed to prevent crashes, memory corruption, and potential system compromise from malicious web content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Net-tools versions up to 2.10 contain multiple stack-based buffer overflow vulnerabilities, including CVE-2025-46836, due to missing bounds checks in interface label handling and unsafe memory operations, potentially allowing arbitrary code execution or crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affect GStreamer plugins, Oracle Java SE 8u471-b50's JavaFX gstreamer component, and Oracle Database Server's GraalVM engine, including heap buffer over-reads and unauthorized data access risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Apache Tomcat versions 9.0.0.M1 to 11.0.9 are vulnerable to the MadeYouReset denial of service attack exploiting improper HTTP/2 stream resets, with multiple updates released to address this and other related security and stability issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including heap use after free, type confusion, stack buffer overflow, and integer overflow, can lead to denial of service, crashes, or data manipulation in affected Oracle products and other environments.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including heap use-after-free, type confusion, stack buffer overflow, integer overflow, and null pointer dereference, can lead to denial of service, crashes, or unauthorized data modification.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including CVE-2025-53057, CVE-2025-53066, and CVE-2025-61748 affect Oracle Java SE and OpenJDK versions 8u461 through 25, allowing unauthenticated network attackers to access and modify critical data via APIs with a CVSS score of 5.9.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical vulnerabilities (CVE-2025-53057, CVE-2025-53066, CVE-2025-61748) in Oracle Java SE and GraalVM across versions 8u461, 11.0.28, 17.0.16, 21.0.8, and 25 allow unauthenticated attackers to gain unauthorized access and modify sensitive data via APIs and XML External Entity attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Apache Tomcat versions up to 11.0.13 suffer from directory traversal and URL normalization vulnerabilities that allow bypassing security constraints and potential remote code execution via PUT requests, alongside other issues like denial of service and improper input handling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Apache Tomcat versions up to 11.0.10, 10.1.44, and 9.0.108 include improper neutralization of ANSI escape sequences in log messages, directory traversal with possible remote code execution, denial of service, and other security issues, with fixes in later versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Oracle Java SE, Oracle GraalVM, NetApp products, IBM Java, and OpenJDK versions 21 and 25 involve unauthorized data modification, encoded string handling, XML External Entity attacks, and certificate handling with CVSS scores up to 3.7.
CWE-581 - Object Model Violation: Just One of Equals and Hashcode Defined| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Apache Tomcat versions up to 11.0.13, 10.1.48, and 9.0.115 contain vulnerabilities including denial of service from delayed cleanup of multipart upload files, directory traversal with possible remote code execution, and improper input neutralization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
OpenSSL versions 3.5.x and 3.6.x contain a TLS 1.3 key exchange group selection flaw involving the 'DEFAULT' keyword that affects post-quantum group negotiation, alongside multiple other security vulnerabilities including memory handling and RSA KEM issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM RMI components across various versions allow unauthenticated network attackers to gain unauthorized access, with updates addressing security flaws in RMI, AWT/JavaFX, Networking, and Security components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM components including RMI, AWT, JavaFX, Networking, and Security allow unauthenticated remote attackers to compromise data integrity and execute attacks across various supported Java versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM components across various versions allow unauthenticated remote attackers to access, modify data, execute code, or redirect users, with updates addressing issues in RMI, AWT/JavaFX, Networking, and Security components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical vulnerabilities in Oracle Java SE and GraalVM affect components such as RMI, AWT/JavaFX, Networking, and Security, allowing unauthenticated remote attackers to cause denial of service, execute code, steal information, or modify files across various Java versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Oracle Java SE JavaFX 8u471-b50 contains a difficult-to-exploit vulnerability allowing unauthenticated network attackers with user interaction to modify data in sandboxed applications, while GraalVM Multilingual Engine has a non-exploitable security-in-depth issue in Oracle Database Server.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in SIMATIC CN 4100 versions below V5.0 allows unauthenticated connections and resource exhaustion, potentially disrupting operations and compromising system availability and integrity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in SIMATIC CN 4100 versions below V5.0 allows denial-of-service by exhausting system resources through a high volume of TCP SYN packets.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices fail to properly validate and sanitize PLC/station names on the web interface's communication parameters page, enabling authenticated users with project download rights to inject malicious scripts executed upon page access by legitimate users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in the 'Motion Control Diagnostics' web page allows authenticated users with project download rights to inject malicious scripts via improper validation of Technology Object names, enabling script execution in other users' sessions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices fail to properly validate filenames on their Firmware Update page, allowing remote attackers to execute malicious JavaScript through social engineering, potentially leading to session hijacking or credential theft.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A missing authentication vulnerability in Apache Artemis and ActiveMQ Artemis Core protocol allows unauthenticated remote attackers to inject or exfiltrate messages by forcing brokers to connect to rogue brokers in affected versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Affected devices inadequately restrict web browser access via the Control Panel, enabling unauthenticated attackers to gain unauthorized access and potentially exploit system vulnerabilities.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL versions contain critical vulnerabilities including use-after-free in DANE client code, NULL pointer dereferences, heap buffer overflows, and RSA KEM failure handling issues, affecting TLS and cryptographic operations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A NULL pointer dereference vulnerability in OpenSSL's delta CRL processing can cause application crashes and Denial of Service, with exploitation requiring specific conditions and assessed as low severity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including NULL pointer dereferences in CMS KeyAgreeRecipientInfo processing, use-after-free, heap buffer overflow, and TLS 1.3 key agreement issues can cause application crashes and Denial of Service, affecting various OpenSSL versions and some NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A NULL pointer dereference vulnerability (CVE-2026-28390) in OpenSSL occurs during processing of crafted CMS EnvelopedData messages with KeyTransportRecipientInfo using RSA-OAEP, potentially causing application crashes and Denial of Service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including a heap buffer overflow in hexadecimal conversion on 32-bit platforms, use-after-free, NULL pointer dereferences, TLS 1.3 key agreement issues, and RSA KEM failure handling have been identified, affecting various versions and products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
OpenSSL's RSASVE key encapsulation vulnerability (CVE-2026-31790) allows sensitive data leakage from uninitialized memory due to improper handling of RSA_public_encrypt() failures and invalid RSA public key validation, affecting multiple products including Oracle Database Server and NetApp devices.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of Teamcenter contain a vulnerability where improper encoding or filtering of user-supplied data allows attackers to inject malicious code that executes when other users access the affected content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of Teamcenter contain hardcoded obfuscation keys embedded in the application, which attackers can extract to gain unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Axios versions prior to 1.15.0 and 0.3.1 contain a prototype pollution vulnerability exploitable via a header injection gadget chain, enabling escalation to remote code execution or full cloud compromise including AWS IMDSv2 bypass.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
An SQL injection vulnerability in the KACO Meteor server of blueplanet devices allows an authorized local network attacker to escalate privileges.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A path traversal vulnerability in ROS# versions prior to V2.2.2 allows remote attackers to access arbitrary files due to improper sanitization of user input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in Solid Edge SE2026 versions before V226.0 Update 5 allows remote code execution via uninitialized pointer access during parsing of specially crafted PAR files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A stack-based buffer overflow vulnerability in Solid Edge SE2026 (all versions before V226.0 Update 5) when parsing specially crafted PAR files could enable code execution within the current process context.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in verschillende (OT-)producten. Het gaat onder andere om producten in de Siemens RUGGEDCOM-, SCALANCE-, SIMATIC-, SIMIT-, SINAMICS-, SIPROTEC-, SENTRON- en Solid Edge-productreeksen.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution\n- Toegang tot gevoelige gegevens\n- Verhogen van rechten\n\nVoor succesvol misbruik van de genoemde kwetsbaarheden moet de kwaadwillende (netwerk)toegang hebben tot het kwetsbare product. Het is goed gebruik een dergelijke producten niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Insecure Inherited Permissions",
"title": "CWE-277"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-078743.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-081142.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-085541.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-357982.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-387223.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-392349.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-545643.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-577017.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-688146.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-783943.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-786884.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-827383.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-870926.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-876049.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-921111.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-973901.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens-producten",
"tracking": {
"current_release_date": "2026-05-13T06:33:28.624303Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0147",
"initial_release_date": "2026-05-13T06:33:28.624303Z",
"revision_history": [
{
"date": "2026-05-13T06:33:28.624303Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "IE/PB-Link Firmware (OS)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "IE/PB-link Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Opcenter RDnL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "SCALANCE M-800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "SCALANCE M-800 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "SCALANCE X-200 series firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SCALANCE X-300 Series Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200 SP Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "SIMIT"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "SINAMICS G115D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "SINAMICS G130"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "SINAMICS S110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "SINAMICS S150"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Scalance W-700 Ieee 80211N Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-37"
}
}
],
"category": "product_name",
"name": "Scalance X-200 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-38"
}
}
],
"category": "product_name",
"name": "Scalance X-300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-39"
}
}
],
"category": "product_name",
"name": "Sentron PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-40"
}
}
],
"category": "product_name",
"name": "Simatic S7-400 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-41"
}
}
],
"category": "product_name",
"name": "Simcenter Femap"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-42"
}
}
],
"category": "product_name",
"name": "Sinamics G120"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-43"
}
}
],
"category": "product_name",
"name": "Sinamics S120"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-44"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2026"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-45"
}
}
],
"category": "product_name",
"name": "Teamcenter"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-46"
}
}
],
"category": "product_name",
"name": "SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8"
}
],
"category": "vendor",
"name": "Siemens AG"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13103",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple U-Boot versions, including DENX and Das U-Boot through 2019.07-rc4, contain vulnerabilities such as infinite recursion from crafted DOS partition tables causing crashes, alongside numerous CVEs from 2019-2020 affecting bootloader functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13103 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13103.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13103"
},
{
"cve": "CVE-2019-13104",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "U-Boot versions 2016.11-rc1 through 2019.07-rc4 contain multiple security vulnerabilities, including a memcpy() underflow and stack buffer overflow triggered by crafted ext4 filesystems, addressed by CVE-2019-13106 and CVE-2019-13104.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13104 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13104"
},
{
"cve": "CVE-2019-13106",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple U-Boot versions from 2016.09 to 2019.07-rc4 contain critical security vulnerabilities including stack buffer overflow and memcpy() underflow related to crafted ext4 filesystems, enabling potential code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13106 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13106.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13106"
},
{
"cve": "CVE-2019-14192",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an integer underflow causing unbounded memcpy in net_process_received_packet during UDP parsing, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14192 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14192.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14192"
},
{
"cve": "CVE-2019-14193",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an unbounded memcpy in Das U-Boot\u0027s nfs_readlink_reply function before version 2019.07, were addressed across various updates fixing numerous CVEs and improving hardware compatibility and functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14193 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14193.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14193"
},
{
"cve": "CVE-2019-14194",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an unbounded memcpy in the NFSv2 nfs_read_reply function, were addressed in Das U-Boot through updates fixing numerous CVEs and improving hardware support and network boot functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14194 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14194.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14194"
},
{
"cve": "CVE-2019-14195",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot\u0027s nfs_readlink_reply function prior to version 2019.07, along with various CVEs affecting network boot, USB, EFI, and descriptor handling, were addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14195 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14195"
},
{
"cve": "CVE-2019-14196",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including unbounded memcpy in Das U-Boot up to version 2019.07 and various CVEs such as CVE-2019-13106, CVE-2019-11059, and CVE-2020-10648 were addressed in updates improving network boot, USB, and EFI support.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14196 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14196"
},
{
"cve": "CVE-2019-14197",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including out-of-bounds read issues in the nfs_read_reply function, were addressed in Das U-Boot up to version 2019.07 through updates fixing numerous CVEs and improving hardware compatibility and functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14197 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14197"
},
{
"cve": "CVE-2019-14198",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot\u0027s nfs_read_reply function and various CVEs affecting network boot, USB, and EFI support on ARM platforms have been addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14198 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14198"
},
{
"cve": "CVE-2019-14199",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "description",
"text": "Das U-Boot through version 2019.07 contains multiple security vulnerabilities including an integer underflow causing unbounded memcpy in UDP packet handling, with fixes addressing numerous CVEs from 2019 and 2020 alongside various functional improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14199 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14199"
},
{
"cve": "CVE-2019-14200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Das U-Boot through version 2019.07 contains multiple security vulnerabilities including a stack-based buffer overflow in the nfs_handler reply helper function rpc_lookup_reply, with updates addressing numerous CVEs and various hardware and network boot issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14200 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14200"
},
{
"cve": "CVE-2019-14201",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack-based buffer overflows in the nfs_lookup_reply function, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and other hardware-related issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14201 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14201"
},
{
"cve": "CVE-2019-14202",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including stack-based buffer overflows in the nfs_readlink_reply function and various CVEs affecting Das U-Boot through version 2019.07 have been addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14202 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14202.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14202"
},
{
"cve": "CVE-2019-14203",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07 have been addressed, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14203 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14203"
},
{
"cve": "CVE-2019-14204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07, have been addressed in updates that also fix network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14204 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14204.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14204"
},
{
"cve": "CVE-2020-10648",
"notes": [
{
"category": "description",
"text": "Multiple U-Boot updates through 2020 address numerous security vulnerabilities including verified boot bypass, arbitrary code execution, and signature verification flaws, alongside fixes for hardware compatibility and network boot issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-10648 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-10648.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2020-10648"
},
{
"cve": "CVE-2022-2347",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "The U-Boot DFU implementation contains a vulnerability where an unchecked USB DFU download length field allows a physical attacker to write beyond a heap buffer by specifying a wLength greater than 4096 bytes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2347.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-2347"
},
{
"cve": "CVE-2022-30552",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot, including buffer overflows and arbitrary out-of-bounds writes during IP packet defragmentation and i2c md command processing, can cause denial of service and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-30552"
},
{
"cve": "CVE-2022-30790",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot, including buffer overflows and out-of-bounds writes (CVE-2022-30552, CVE-2022-30790, CVE-2022-30767, CVE-2022-34835), affect components like IP defragmentation and i2c md command, impacting EcoStruxure\u2122 Panel Server Box and other systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-30790"
},
{
"cve": "CVE-2022-34835",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot through 2022.07-rc5 include a stack-based buffer overflow in the \u0027i2c md\u0027 command due to an integer signedness error, heap overflow in squashfs, and out-of-bounds writes in IP defragmentation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-34835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-34835"
},
{
"cve": "CVE-2023-3019",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in QEMU, including heap buffer overflow, use-after-free, NULL pointer dereference, DMA reentrancy, and integer overflow, affect various components such as e1000e NIC emulation and Virtio, leading to denial of service, data disclosure, and potential code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3019 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-3019.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2023-3019"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "description",
"text": "Multiple Python updates address critical vulnerabilities including incorrect parsing of email addresses with special characters (CVE-2023-27043), timing side channels in HMAC comparison, and other security flaws affecting versions up to 3.11.12 with extensive fixes and improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2024-3447",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "This QEMU update addresses multiple critical security vulnerabilities including heap buffer overflows, use-after-free, NULL pointer dereferences, DMA reentrancy double free, and information leaks affecting various versions and NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3447 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-3447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-3447"
},
{
"cve": "CVE-2024-4367",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "description",
"text": "A missing type check in PDF.js font handling in Mozilla Firefox, Firefox ESR, and Thunderbird allows arbitrary JavaScript execution, affecting versions prior to Firefox 126, ESR 115.11, and Thunderbird 115.11.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4367 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-4367.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-4367"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-277",
"name": "Insecure Inherited Permissions"
},
"notes": [
{
"category": "other",
"text": "Insecure Inherited Permissions",
"title": "CWE-277"
},
{
"category": "description",
"text": "Linux PAM versions prior to 1.6.0, including the pam_namespace module, contain local denial of service vulnerabilities due to improper handling of mkfifo and missing O_DIRECTORY flag in openat calls, with additional security flaws found in Red Hat OpenShift and IBM QRadar SIEM components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22365 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-22365.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-47704",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP5 and SP6 kernels, including Confidential Computing, Azure, RT, and Micro variants, received extensive security and non-security updates addressing vulnerabilities across networking, memory, filesystems, device drivers, graphics, and multiple architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47704.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-54017",
"cwe": {
"id": "CWE-334",
"name": "Small Space of Random Values"
},
"notes": [
{
"category": "other",
"text": "Small Space of Random Values",
"title": "CWE-334"
},
{
"category": "description",
"text": "Multiple versions of SIPROTEC 5 devices are vulnerable to brute force attacks on insufficiently random session identifiers, allowing unauthenticated remote attackers to gain unauthorized read access to limited web server information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54017 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-54017.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-54017"
},
{
"cve": "CVE-2024-57256",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple integer overflow vulnerabilities in Das U-Boot before 2025.01-rc1 affect ext4 symlink resolution, inode size handling, DHCP response processing, and memory allocation, potentially leading to memory corruption and arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57256 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57256"
},
{
"cve": "CVE-2024-57258",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Das U-Boot before version 2025.01-rc1 contains multiple integer overflow vulnerabilities in memory allocation, ext4 symlink resolution, and squashfs filesystem handling, potentially leading to crashes or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57258 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57258.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57258"
},
{
"cve": "CVE-2024-57924",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security and non-security fixes were applied across various SUSE Linux Enterprise kernels, addressing numerous vulnerabilities in networking, filesystems, Bluetooth, and other kernel subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57924"
},
{
"cve": "CVE-2024-58240",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernels, including versions 12, 15 (SP3 to SP7), Micro 6.x, and Azure variants, received extensive security updates addressing vulnerabilities in Bluetooth, networking, filesystems, USB, SCSI, memory management, and hardware drivers, alongside a Linux kernel TLS decryption refactor to improve processing correctness.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-58240 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58240.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-58240"
},
{
"cve": "CVE-2025-0395",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "description",
"text": "Multiple vulnerabilities including a buffer overflow in glibc\u0027s assert() function (CVE-2025-0395) affect GNU C Library versions 2.13 to 2.40 and various products like NetApp, Oracle Communications, and HPE Brocade, leading to potential DoS, data modification, and unauthorized access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0395 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-0395"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "A vulnerability in MIT Kerberos 5 (CVE-2025-3576) allows spoofing of GSSAPI-protected messages via weaknesses in the RC4-HMAC-MD5 checksum, leading to disabling of weak ciphers like des3-cbc-sha1 and arcfour-hmac-md5 by default.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-6020",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "A set of vulnerabilities in linux-pam\u0027s pam_namespace module, including symlink and race condition flaws, allow local users to escalate privileges to root and cause information disclosure or denial of service, addressed by updates changing path handling and disabling user .pam_environment file reading.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6020 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6020"
},
{
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including integer overflows, stack buffer overflows, heap use-after-free, type confusion, and null pointer dereferences, can lead to denial of service or crashes, affecting versions up to 2.14.3 and related Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6021 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6021.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6052",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple vulnerabilities in GLib\u0027s GString, including integer overflow and buffer underflow (CVE-2025-6052, CVE-2025-4373), and a difficult-to-exploit Java SE 8u471-b50 JavaFX flaw can cause crashes, memory corruption, or partial denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6052"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "A heap use-after-free vulnerability in libxslt caused by attribute type flag corruption leads to memory corruption, crashes, and potential code execution, affecting libxml2, Oracle Java SE 8u471-b50, and Oracle Communications Cloud Native Core Certificate Management with CVSS scores up to 7.8.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities including excessive resource allocation, denial of service, injection flaws, and information disclosure affect Bouncy Castle Java libraries, Oracle Communications, Oracle Siebel CRM, Oracle Fusion Middleware, HPE Telco Service Activator, and various Ubuntu LTS versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including CVE-2025-9230 cause out-of-bounds read/write in RFC 3211 KEK unwrap during CMS password-based decryption, potentially leading to crashes or code execution, with moderate severity and low exploit likelihood due to rare usage.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9230 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-9231",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "description",
"text": "Multiple vulnerabilities including a timing side-channel in the SM2 algorithm on 64-bit ARM platforms, memory handling flaws, and denial of service issues affect OpenSSL, Oracle PeopleSoft, Oracle JD Edwards, and NetApp products, with moderate severity in some cases.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9231 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9231"
},
{
"cve": "CVE-2025-9232",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities, including an out-of-bounds read in the HTTP client \u0027no_proxy\u0027 handling causing denial of service, affect various products such as Oracle Essbase, PeopleSoft, JD Edwards, SAP NetWeaver, and NetApp, with severity ranging from low to moderate.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9232 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9232"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Libxml2 versions up to 2.9.14 contain infinite recursion vulnerabilities in exsltDynMapFunction and catalog parsing functions, causing stack exhaustion and local denial of service without arbitrary memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9714"
},
{
"cve": "CVE-2025-9820",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "GnuTLS versions prior to 3.8.11 contain buffer overflow vulnerabilities in gnutls_pkcs11_token_init and issues with malicious certificates and PKCS11 token labels, leading to denial of service and potential arbitrary code execution (CVE-2025-9820, CVE-2025-14831).",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9820"
},
{
"cve": "CVE-2025-12659",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "A memory corruption vulnerability in applications parsing specially crafted IPT files may enable attackers to execute arbitrary code within the affected process.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12659 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12659.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-12659"
},
{
"cve": "CVE-2025-14831",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "description",
"text": "GnuTLS versions prior to 3.8.12 contain vulnerabilities including CVE-2025-14831, causing denial of service via excessive CPU and memory use from malicious certificates with many name constraints and SANs, and CVE-2025-9820, related to crashes or potential code execution from PKCS11 token label mishandling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14831.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-14831"
},
{
"cve": "CVE-2025-22871",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "description",
"text": "A vulnerability in Go\u0027s net/http package allows acceptance of chunked data with bare LF line terminators, enabling HTTP request smuggling when combined with other misinterpreting servers, affecting multiple Go versions prior to 1.23.8 and 1.24.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-22871.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-22871"
},
{
"cve": "CVE-2025-23143",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various architectures and subsystems were fixed, including null pointer dereferences and privilege escalation risks, to enhance system security and prevent local attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23143 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-23143.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-23143"
},
{
"cve": "CVE-2025-23160",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernels, including 15 SP6, 15 SP7, and Micro 6.x versions, received extensive security and non-security updates addressing vulnerabilities in networking, filesystems, drivers, CPU cache initialization, AMD processors, and various kernel subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23160 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-23160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-23160"
},
{
"cve": "CVE-2025-31257",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including use-after-free flaws and memory corruption in WebKitGTK, Safari 18.5, and Oracle Java SE JavaFX were fixed through improved memory handling and updates addressing crashes, data exfiltration, and remote code execution risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31257 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-31257"
},
{
"cve": "CVE-2025-37931",
"notes": [
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise and Micro kernel versions received extensive security updates addressing numerous vulnerabilities across CPU cache initialization, AMD processors, filesystems including btrfs, drivers, and various kernel subsystems, alongside many non-security bug fixes and improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-37931 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-37931.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-37931"
},
{
"cve": "CVE-2025-37968",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple updates to SUSE Linux Enterprise kernels, including 15 SP6, SP7, Micro, Azure, Confidential Computing, and RT variants, addressed numerous security vulnerabilities and bugs across diverse subsystems such as media, networking, tracing, filesystems, drivers, and CPU architectures including AMD processors and the VMSCAPE flaw.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-37968 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-37968.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-37968"
},
{
"cve": "CVE-2025-38322",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities and non-security bugs affecting various Linux kernel subsystems, including CPU cache initialization flaws, AMD processor data leakage, and a Linux kernel crash on RaptorLake CPUs, were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38347",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including a f2fs filesystem inode sanity check fix, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were addressed across various subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38347.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38347"
},
{
"cve": "CVE-2025-38491",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including atomicity issues in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38491"
},
{
"cve": "CVE-2025-38502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update fixed multiple critical vulnerabilities including out-of-bounds access in cgroup local storage via BPF, AppArmor LSM flaws, AMD CPU microcode loading issues, and the VMSCAPE branch predictor isolation vulnerability across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38502 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38502.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38502"
},
{
"cve": "CVE-2025-38552",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including race conditions in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38552"
},
{
"cve": "CVE-2025-38614",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw and CPU cache initialization issues, were addressed in various Linux kernel versions across SUSE Linux Enterprise and Linux Micro products, with fixes spanning numerous architectures, subsystems, and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38614 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38614.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38614"
},
{
"cve": "CVE-2025-38670",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including arm64 stack switching, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw\u2014were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38670 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38670.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38670"
},
{
"cve": "CVE-2025-38676",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "other",
"text": "Buffer Access with Incorrect Length Value",
"title": "CWE-805"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack buffer overflows, CPU cache initialization flaws, and the VMSCAPE branch predictor isolation issue, were fixed across various Linux kernel components and SUSE Linux Enterprise products to enhance system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38676 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38676.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38676"
},
{
"cve": "CVE-2025-38677",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update fixed multiple security vulnerabilities including out-of-boundary access in the f2fs filesystem, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38677 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38677"
},
{
"cve": "CVE-2025-38679",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including the media: venus driver, CPU cache initialization, AMD processors, and numerous drivers, were addressed through extensive patches in SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38679 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38679.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38679"
},
{
"cve": "CVE-2025-38680",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, uvcvideo driver, AppArmor module, and branch predictor isolation (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions to address out-of-bounds reads, privilege escalation, data leakage, and system integrity issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38680 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38680.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38680"
},
{
"cve": "CVE-2025-38681",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including a race condition in ptdump and the VMSCAPE flaw in branch predictor isolation, were addressed across SUSE Linux Enterprise and Micro kernels from 15 SP6 to 16.0 and 6.2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38681 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38681"
},
{
"cve": "CVE-2025-38683",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Missing Synchronization",
"title": "CWE-820"
},
{
"category": "description",
"text": "Multiple Linux kernel updates for SUSE Linux Enterprise and Micro versions address numerous security vulnerabilities and non-security bugs across various subsystems including networking, filesystems, drivers, AMD processor issues, and kernel panic fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38683 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38683.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38683"
},
{
"cve": "CVE-2025-38684",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures and subsystems, including a NULL pointer dereference in net/sched ets, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38684.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38684"
},
{
"cve": "CVE-2025-38685",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel across various SUSE Linux Enterprise versions and architectures were fixed, including issues in fbdev, Bluetooth, networking, filesystems, device drivers, AMD processors, virtualization, and memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38685 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38687",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and AMD processors\u2014including race conditions, use-after-free errors, CPU cache initialization flaws, and branch predictor isolation issues\u2014were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38687.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38687"
},
{
"cve": "CVE-2025-38691",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems and architectures, including AMD CPU flaws, pNFS layout issues, and the VMSCAPE branch predictor isolation flaw, were addressed across SUSE Linux Enterprise and Micro kernel versions with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38691.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38691"
},
{
"cve": "CVE-2025-38693",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors, Linux kernel subsystems, and the VMSCAPE flaw in branch predictor isolation were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like null pointer dereferences, race conditions, use-after-free, and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38693"
},
{
"cve": "CVE-2025-38694",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems\u2014including memory management, networking, USB, SCSI, and CPU cache initialization\u2014were addressed across SUSE Linux Enterprise and Micro kernel versions with numerous CVE fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38694"
},
{
"cve": "CVE-2025-38695",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors, Linux kernel subsystems, and drivers\u2014including a null pointer dereference in the SCSI lpfc driver and the VMSCAPE branch predictor isolation flaw\u2014were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38695 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38695.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38695"
},
{
"cve": "CVE-2025-38696",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various CPU architectures and Linux kernel subsystems, including MIPS stack handling, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed to prevent crashes, privilege escalation, and data leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38696.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38696"
},
{
"cve": "CVE-2025-38697",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including a critical out-of-bounds access flaw in the jfs filesystem and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38697.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38697"
},
{
"cve": "CVE-2025-38698",
"notes": [
{
"category": "description",
"text": "Multiple updates to the Linux kernel and SUSE Linux Enterprise products addressed numerous critical security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and filesystems, including fixes for data leakage, memory corruption, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38698.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38698"
},
{
"cve": "CVE-2025-38699",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others addressed critical vulnerabilities including a double-free flaw in the scsi bfa driver, CPU cache initialization issues on AMD processors, the VMSCAPE vulnerability, race conditions, and use-after-free bugs across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38699"
},
{
"cve": "CVE-2025-38700",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across various architectures, subsystems, and drivers, including fixes for AMD CPU cache issues, iSER setup panics, and VMSCAPE branch predictor flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38700 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38700.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38700"
},
{
"cve": "CVE-2025-38701",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities including a branch predictor isolation flaw (VMSCAPE), CPU cache initialization issues, AMD processor data leaks, and ext4 filesystem error handling improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38701"
},
{
"cve": "CVE-2025-38702",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including fbdev, memory management, networking, schedulers, and hardware drivers, were addressed across SUSE Linux Enterprise and Micro kernel versions to prevent buffer overflows, data leakage, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38702 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38702"
},
{
"cve": "CVE-2025-38706",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including null pointer dereference, CPU cache initialization flaws, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were discovered and fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38706.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38706"
},
{
"cve": "CVE-2025-38707",
"notes": [
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple security vulnerabilities across various subsystems and architectures, including fixes for the NTFS3 file system, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38707"
},
{
"cve": "CVE-2025-38708",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple security vulnerabilities across various architectures and subsystems, including fixes for DRBD use-after-free, AMD CPU cache flaws, AppArmor LSM issues, and the VMSCAPE branch predictor isolation vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38708.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38708"
},
{
"cve": "CVE-2025-38711",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures, drivers, and subsystems\u2014including a deadlock in SMB server, AMD CPU issues, SEV-SNP memory integrity flaws, and the VMSCAPE branch predictor isolation vulnerability\u2014were fixed to enhance system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38711 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38711.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38711"
},
{
"cve": "CVE-2025-38712",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw, CPU cache initialization issues, and memory management bugs, were fixed across various Linux kernel versions and SUSE Enterprise products affecting numerous architectures and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38712 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38712.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38712"
},
{
"cve": "CVE-2025-38713",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including slab-out-of-bounds reads, use-after-free, race conditions, memory leaks, CPU cache initialization flaws, AMD processor data leakage, and the critical VMSCAPE branch predictor isolation flaw were fixed across various Linux kernel subsystems in SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38713 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38713.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-38714",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including a slab-out-of-bounds issue in the Linux kernel\u0027s hfsplus_bnode_read() function and the VMSCAPE flaw affecting branch predictor isolation, were fixed across various SUSE Linux Enterprise and Linux kernel versions impacting numerous subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38714"
},
{
"cve": "CVE-2025-38715",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems including HFS filesystem, coresight, sched, usb, scsi, KVM, netfilter, and others were fixed across SUSE Linux Enterprise and Micro kernels to prevent memory access violations, data leakage, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38715 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38715.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38715"
},
{
"cve": "CVE-2025-38721",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including a refcount leak in netfilter, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue were fixed across various Linux kernel versions and SUSE Enterprise products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38721 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38721.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38721"
},
{
"cve": "CVE-2025-38723",
"notes": [
{
"category": "description",
"text": "A vulnerability in the Linux kernel\u0027s LoongArch BPF implementation caused incorrect jump offset calculations in tail calls, leading to soft lockups, which was fixed by correcting the JIT context initialization and offset calculation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38723 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38723.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38723"
},
{
"cve": "CVE-2025-38724",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including use-after-free, race conditions, CPU cache flaws, and branch predictor isolation issues, were addressed across SUSE Linux Enterprise and Micro kernels with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38724"
},
{
"cve": "CVE-2025-38725",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions, including SUSE Enterprise and Micro kernels, were addressed, covering issues in drivers, filesystems, CPU architectures (notably AMD), and virtualization subsystems such as the VMSCAPE flaw.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38725 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38725"
},
{
"cve": "CVE-2025-38727",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting Linux kernel components including netlink, schedulers, drivers, memory management, and GPU subsystems were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38727 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38727"
},
{
"cve": "CVE-2025-38728",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including slab out-of-bounds in the smb3 subsystem, CPU cache initialization flaws, and AMD processor data leakage, were fixed across various SUSE Linux Enterprise versions and NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-38729",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems were addressed, including issues like race conditions, memory leaks, use-after-free bugs, CPU cache initialization flaws, and branch predictor isolation (VMSCAPE).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38729"
},
{
"cve": "CVE-2025-38732",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"notes": [
{
"category": "other",
"text": "Improper Update of Reference Count",
"title": "CWE-911"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions and SUSE Linux Enterprise products, including issues like destination refcount leaks, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38732 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38732"
},
{
"cve": "CVE-2025-38735",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting SUSE Linux Enterprise kernels, including AMD processors, AppArmor LSM, and various kernel subsystems and drivers, were fixed to prevent kernel crashes, privilege escalation, data leaks, and integrity loss.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38735 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38735.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38735"
},
{
"cve": "CVE-2025-38736",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security fixes were applied across various SUSE Linux Enterprise and Micro kernel versions, addressing vulnerabilities such as race conditions, use-after-free bugs, memory leaks, null pointer dereferences, and a specific fix in the Linux kernel asix_devices USB network driver for PHY address masking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38736 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38736"
},
{
"cve": "CVE-2025-39673",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and race conditions affecting various Linux kernel subsystems, including ppp, scsi, net, drm, ACPI, and critical AMD CPU and SEV-SNP memory integrity issues, were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39673 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39673.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39673"
},
{
"cve": "CVE-2025-39675",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across numerous subsystems and architectures, including null pointer dereferences, CPU cache initialization flaws, data leakage, and branch predictor isolation issues, were identified and addressed in various SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39675 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39675.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39675"
},
{
"cve": "CVE-2025-39676",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Unexpected Status Code or Return Value",
"title": "CWE-394"
},
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Linux Enterprise and Micro versions, addressed numerous critical security vulnerabilities across various subsystems, drivers, and architectures, such as CPU cache initialization, AMD processor data leakage, and the VMSCAPE flaw involving branch predictor isolation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39676 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39676.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39676"
},
{
"cve": "CVE-2025-39681",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw\u2014were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39681 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39681"
},
{
"cve": "CVE-2025-39682",
"notes": [
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernel updates address numerous security vulnerabilities including buffer overflows, use-after-free, race conditions, TLS zero-length record handling, malicious packet rejection, and constant-time MAC comparison across various subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39682 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39682.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39683",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others addressed numerous security vulnerabilities including KASAN slab-out-of-bounds, CPU cache initialization flaws, AMD processor data leakage, VMSCAPE branch predictor isolation, and local privilege escalation in AppArmor LSM across various kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39683 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39683.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39683"
},
{
"cve": "CVE-2025-39684",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, SEV-SNP guest memory, and the VMSCAPE branch predictor flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive fixes in numerous subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39684.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39684"
},
{
"cve": "CVE-2025-39685",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including drivers, filesystems, networking, and virtualization components, were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like race conditions, use-after-free, memory leaks, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39685 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39685"
},
{
"cve": "CVE-2025-39686",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting various Linux kernel versions and subsystems, including AMD processor flaws, race conditions, use-after-free bugs, and the VMSCAPE vulnerability, were fixed across SUSE Linux Enterprise and Linux Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39686 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39686.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39686"
},
{
"cve": "CVE-2025-39687",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems\u2014including the iio light as73211 driver and the VMSCAPE branch predictor isolation flaw\u2014were fixed to prevent data leakage and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39687.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39687"
},
{
"cve": "CVE-2025-39689",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems\u2014including ftrace use-after-free bugs, AMD processor data leakage, SEV-SNP memory integrity, and VMSCAPE branch predictor isolation\u2014were fixed across SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39689 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39691",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and CPU cache initialization issues, were fixed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and Micro products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39691.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39691"
},
{
"cve": "CVE-2025-39692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel security updates addressed numerous vulnerabilities including improper CPU cache initialization affecting AMD processors and SEV-SNP guest memory, alongside fixes for local privilege escalation in AppArmor and kernel subsystem issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39692.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39692"
},
{
"cve": "CVE-2025-39693",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including drm/amd/display, AMD CPU cache, AppArmor LSM, and virtualization branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39693"
},
{
"cve": "CVE-2025-39694",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Index, Position, or Offset in Input",
"title": "CWE-1285"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including s390/sclp, AMD CPU cache initialization, AppArmor, and others, were fixed across SUSE Linux Enterprise and Micro products, addressing issues such as improper memory access and data leakage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39694"
},
{
"cve": "CVE-2025-39697",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including race conditions, use-after-free flaws, and branch predictor isolation issues, were identified and fixed across various Linux kernel subsystems and architectures, notably affecting SUSE Linux Enterprise and Micro distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39697.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39697"
},
{
"cve": "CVE-2025-39701",
"cwe": {
"id": "CWE-1025",
"name": "Comparison Using Wrong Factors"
},
"notes": [
{
"category": "other",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel components, including ACPI\u0027s pfr_update driver, AMD processors, and SEV-SNP guest memory integrity, were discovered and addressed across SUSE Linux Enterprise and Micro kernel versions with extensive fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39701"
},
{
"cve": "CVE-2025-39702",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "description",
"text": "Multiple severe security vulnerabilities affecting various Linux kernel subsystems, including ipv6: sr MAC timing attacks, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39702 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39702"
},
{
"cve": "CVE-2025-39703",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including HSR network protocol, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels with extensive updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39703.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39703"
},
{
"cve": "CVE-2025-39706",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and architectures, including fixes for KFD debugfs, AppArmor LSM, and SEV-SNP guest memory issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39706.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39706"
},
{
"cve": "CVE-2025-39709",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems and AMD processors, including critical CPU cache initialization flaws, data leakage, and the VMSCAPE branch predictor isolation issue, were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39709 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39709.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39709"
},
{
"cve": "CVE-2025-39710",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and stability issues affecting various Linux kernel subsystems, architectures, and AMD processors were addressed across SUSE Linux Enterprise and Micro kernels, including fixes for the media: venus driver and the VMSCAPE vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39710"
},
{
"cve": "CVE-2025-39713",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel components, including AMD CPU data leakage, race conditions, and branch predictor isolation flaws, were fixed across SUSE Linux Enterprise and Linux kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39713 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39713.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39713"
},
{
"cve": "CVE-2025-39714",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, CPU architectures including AMD processors, and drivers were fixed across SUSE Linux Enterprise and Micro kernels, including a critical VMSCAPE flaw involving branch predictor isolation between guest VMs and hypervisors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39714"
},
{
"cve": "CVE-2025-39715",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures and subsystems, including parisc, CPU cache initialization, AMD processor data leakage, and AppArmor, were addressed to prevent unauthorized access and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39715 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39715.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39715"
},
{
"cve": "CVE-2025-39716",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures, including parisc and AMD processors, were fixed, addressing issues such as improper CPU cache initialization, data leakage, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39716 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39716.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39716"
},
{
"cve": "CVE-2025-39718",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including vsock/virtio SKB overflow, CPU cache initialization flaws, and AMD processor data leakage, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive security and stability updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39718 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39718.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39718"
},
{
"cve": "CVE-2025-39719",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including out-of-bounds array access in the bno055 IMU driver and improper CPU cache initialization, were addressed in updates to SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39719 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39719.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39719"
},
{
"cve": "CVE-2025-39724",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, including AMD CPU data leakage, SEV-SNP guest memory integrity, and the VMSCAPE branch predictor flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39724"
},
{
"cve": "CVE-2025-39736",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "description",
"text": "The Linux kernel addressed multiple security vulnerabilities across various architectures and subsystems, including AMD CPU cache flaws, the VMSCAPE branch predictor isolation issue, and deadlock fixes related to kmemleak_lock and netpoll interactions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39736 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39736"
},
{
"cve": "CVE-2025-39737",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "This Linux kernel update addresses multiple security vulnerabilities across various architectures and subsystems, including AMD CPU data leakage, SEV-SNP memory integrity flaws, VMSCAPE branch predictor isolation issues, and a soft lockup fix in kmemleak cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39737 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39737.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39737"
},
{
"cve": "CVE-2025-39738",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including btrfs subvolume relocation, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39738 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39738.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39738"
},
{
"cve": "CVE-2025-39742",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE Linux Enterprise and others address a wide range of security vulnerabilities including divide-by-zero errors, race conditions, use-after-free, null pointer dereferences, information leaks, and CPU cache initialization flaws across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39742 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39742.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39742"
},
{
"cve": "CVE-2025-39743",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting Linux kernel subsystems, drivers, filesystems, and architectures\u2014including the VMSCAPE flaw and CPU cache and AMD processor issues\u2014were fixed across SUSE Linux Enterprise and Micro product lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39743 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39743.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39743"
},
{
"cve": "CVE-2025-39749",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including data races in RCU, branch predictor isolation (VMSCAPE), AMD processor data leakage, and AppArmor flaws\u2014were addressed through extensive patches across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39749 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39749.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39749"
},
{
"cve": "CVE-2025-39752",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"notes": [
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addresses multiple security vulnerabilities including ARM rockchip SMP initialization hangs, CPU cache initialization flaws, AMD processor data leaks, AppArmor LSM privilege escalations, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39752"
},
{
"cve": "CVE-2025-39756",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE Linux Enterprise and related distributions address critical security vulnerabilities across file descriptor allocation, networking, device drivers, CPU cache initialization, AMD processor data leakage, and branch predictor isolation flaws affecting various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39756 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39756.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39756"
},
{
"cve": "CVE-2025-39757",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, addressed numerous security vulnerabilities such as memory leaks, race conditions, use-after-free bugs, AMD processor data leakage, and a VM branch predictor isolation flaw (VMSCAPE).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39757 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39757.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39757"
},
{
"cve": "CVE-2025-39759",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and race conditions in the Linux kernel, including btrfs qgroup use-after-free and AMD SEV-SNP guest memory issues, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39759 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39759"
},
{
"cve": "CVE-2025-39760",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems, including USB, Bluetooth, and virtualization, were addressed in updates for SUSE Linux Enterprise and related distributions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39760 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39760"
},
{
"cve": "CVE-2025-39766",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and drivers\u2014including CPU cache initialization flaws, AMD data leakage, and the VMSCAPE branch predictor isolation issue\u2014were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39766 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39766"
},
{
"cve": "CVE-2025-39770",
"cwe": {
"id": "CWE-573",
"name": "Improper Following of Specification by Caller"
},
"notes": [
{
"category": "other",
"text": "Improper Following of Specification by Caller",
"title": "CWE-573"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel versions, including SUSE Linux Enterprise and Micro kernels, were addressed, covering issues in IPv6 TSO handling, CPU cache initialization, AMD processor data leakage, and numerous subsystems such as coresight, schedulers, USB, SCSI, networking, and filesystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39770 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39770.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39770"
},
{
"cve": "CVE-2025-39772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, AMD processors, and virtualization components were addressed across various SUSE Linux Enterprise and Micro kernel versions, including fixes for NULL pointer dereferences, race conditions, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39772 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39772.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39772"
},
{
"cve": "CVE-2025-39773",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including timer overflow, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39773 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39773.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39773"
},
{
"cve": "CVE-2025-39776",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple Linux kernel vulnerabilities were fixed, including memory corruption in debug_vm_pgtable, CPU cache initialization flaws, AMD processor data leakage, AppArmor LSM issues, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39776 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39776.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39776"
},
{
"cve": "CVE-2025-39782",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel components, including CPU architectures, drivers, filesystems, and subsystems such as jbd2_log_do_checkpoint and branch predictor isolation (VMSCAPE), were identified and addressed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39782 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39782.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39782"
},
{
"cve": "CVE-2025-39783",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors, including use-after-free bugs, CPU data leakage, SEV-SNP memory integrity issues, and the VMSCAPE flaw in branch predictor isolation, were fixed across various subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39783 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39783"
},
{
"cve": "CVE-2025-39787",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, drivers, and subsystems\u2014including MDT loader buffer validation, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE)\u2014were identified and addressed in SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39787 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39787.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39787"
},
{
"cve": "CVE-2025-39788",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel subsystems, including scsi: ufs: exynos driver, CPU cache initialization, AMD processor data leakage, and branch predictor isolation, were fixed across SUSE Linux Enterprise and other kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39788 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39788.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39790",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, including the MHI host driver, CPU cache initialization, AMD processors, and branch predictor isolation (VMSCAPE), were identified and patched across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39790"
},
{
"cve": "CVE-2025-39794",
"notes": [
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others fixed numerous security vulnerabilities including ARM Tegra I/O memcpy issues, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE vulnerability across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39794 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39794"
},
{
"cve": "CVE-2025-39795",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple critical security vulnerabilities, including CPU cache memory initialization flaws, AMD processor data leakage, the VMSCAPE vulnerability, and various issues across numerous subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39795"
},
{
"cve": "CVE-2025-39798",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous critical security vulnerabilities including memory leaks, race conditions, use-after-free bugs, CPU cache and AMD processor flaws, and the VMSCAPE vulnerability affecting virtualization isolation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39798 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39798"
},
{
"cve": "CVE-2025-39800",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including btrfs metadata corruption, AMD processor flaws, and various subsystems such as memory management, networking, and drivers, were fixed across SUSE Linux Enterprise and Micro products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39800 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39800.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39800"
},
{
"cve": "CVE-2025-39801",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including USB, networking, filesystems, and drivers, were identified and fixed across SUSE Linux Enterprise and Micro kernels, alongside a VMSCAPE flaw impacting branch predictor isolation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39801"
},
{
"cve": "CVE-2025-39806",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including HID multitouch, AppArmor, coresight, sched, USB, SCSI, KVM, and AMD processors, were identified and addressed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39806"
},
{
"cve": "CVE-2025-39808",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including a page fault in the hid-ntrig driver, flaws in AppArmor LSM, the VMSCAPE branch predictor isolation issue, and AMD Zen processor EntrySign flaw, were addressed across various SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39808 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39808"
},
{
"cve": "CVE-2025-39812",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across networking, filesystems, drivers, and subsystems including critical AppArmor LSM flaws and a branch predictor isolation issue (VMSCAPE).",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39812 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39812.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39812"
},
{
"cve": "CVE-2025-39813",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions in ftrace, flaws in AppArmor LSM, AMD CPU microcode verification issues, and the VMSCAPE branch predictor isolation vulnerability across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39813 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39817",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various subsystems such as efivarfs, crypto, bpf, cifs, and architectures were fixed, including slab-out-of-bounds, use-after-free, race conditions, and CPU microcode verification flaws.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39819",
"notes": [
{
"category": "description",
"text": "Multiple updates to SUSE Linux Enterprise kernels address numerous security vulnerabilities including inconsistent reference count handling in SMB filesystem, AppArmor LSM privilege escalations, and AMD Zen CPU microcode verification flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39819 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39823",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Multiple Linux kernel updates across SUSE Linux Enterprise and Micro versions addressed numerous security vulnerabilities including speculative execution side-channel mitigations, AppArmor LSM flaws, AMD CPU microcode issues, and branch predictor isolation (VMSCAPE), affecting various subsystems and drivers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39823 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39823.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39823"
},
{
"cve": "CVE-2025-39824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free in the ASUS HID driver, AppArmor LSM flaws, VMSCAPE branch predictor isolation, and CPU microcode signature issues in AMD Zen processors, affect various Linux kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39824 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39824"
},
{
"cve": "CVE-2025-39825",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"notes": [
{
"category": "other",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions, use-after-free bugs, memory leaks, and critical flaws in the AppArmor LSM and AMD Zen CPU microcode verification across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39825 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39825.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39825"
},
{
"cve": "CVE-2025-39826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including race conditions, use-after-free bugs, privilege escalations, denial of service, and information leaks were fixed across various Linux kernel subsystems and the AppArmor LSM in SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39826 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39826.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39826"
},
{
"cve": "CVE-2025-39827",
"notes": [
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, address numerous security vulnerabilities such as slab-use-after-free, privilege escalation, denial of service, and information leaks across various subsystems, drivers, and architectures, with notable fixes in AppArmor LSM and AMD Zen microcode verification.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39827 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39827"
},
{
"cve": "CVE-2025-39828",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities, including flaws in the Linux kernel\u0027s ATM TCP driver, AppArmor LSM, and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39828 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39828.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39828"
},
{
"cve": "CVE-2025-39835",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including XFS filesystem, AppArmor LSM, AMD processors, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels to prevent system crashes, privilege escalation, and data exposure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39835"
},
{
"cve": "CVE-2025-39838",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, and privilege escalation flaws in the Linux kernel and AppArmor module were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels, as well as AMD processor microcode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39838.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39838"
},
{
"cve": "CVE-2025-39839",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions and subsystems, including batman-adv, AppArmor, and AMD processors, were identified and fixed, addressing issues such as out-of-bounds reads/writes, race conditions, use-after-free, and information exposure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39839.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39839"
},
{
"cve": "CVE-2025-39841",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting various Linux kernel subsystems, including SCSI drivers, AppArmor security module, memory management, and a branch predictor isolation flaw (VMSCAPE), were addressed in updates for SUSE Linux Enterprise and Linux kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39841 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39841.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39841"
},
{
"cve": "CVE-2025-39842",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities including null pointer dereferences in ocfs2, AppArmor LSM privilege escalations, and AMD Zen microcode flaws were fixed across various SUSE Linux Enterprise and Micro kernel versions, addressing memory leaks, race conditions, and driver issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39842 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39842.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39842"
},
{
"cve": "CVE-2025-39843",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM, including a deadlock in the SLUB allocator and AMD CPU microcode verification flaws, were fixed to prevent denial of service, privilege escalation, and information leaks across numerous architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39843 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39843.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39843"
},
{
"cve": "CVE-2025-39844",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including AppArmor, memory management, drivers, and AMD processors, were discovered and addressed across SUSE Linux Enterprise and Micro kernels, involving privilege escalation, denial of service, and information exposure risks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39844 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39844.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39844"
},
{
"cve": "CVE-2025-39845",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting Linux kernel subsystems, including AppArmor LSM, x86/mm/64 paging, and AMD processors, were addressed in various SUSE Linux Enterprise and Micro kernel updates to fix privilege escalation, memory leaks, race conditions, and system crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39845 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39845.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39845"
},
{
"cve": "CVE-2025-39846",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, race conditions, use-after-free, memory leaks, and privilege escalation flaws were addressed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39846 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39846.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39846"
},
{
"cve": "CVE-2025-39847",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including memory leaks, privilege escalation, denial of service, and information leaks, were identified and fixed across various Linux kernel subsystems, drivers, and architectures, notably affecting SUSE Linux Enterprise and AppArmor modules.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39847 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39847"
},
{
"cve": "CVE-2025-39848",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and regressions affecting the Linux kernel, including the AppArmor security module, AMD CPU microcode verification, and subsystems like coresight, sched, usb, scsi, and netfilter, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39848 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39848.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39848"
},
{
"cve": "CVE-2025-39849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including a critical SSID length bounds check fix in cfg80211, numerous AppArmor LSM flaws, and a critical AMD Zen CPU microcode signature verification issue, were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39849 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39849"
},
{
"cve": "CVE-2025-39853",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including the i40e driver, AppArmor LSM, and AMD CPU microcode, were fixed across various SUSE Linux Enterprise and Micro kernel versions to address privilege escalation, denial of service, and information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39853 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39853"
},
{
"cve": "CVE-2025-39857",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, race conditions, memory leaks, use-after-free bugs, and flaws in the AppArmor Linux kernel Security Module and AMD Zen microcode verification were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39857"
},
{
"cve": "CVE-2025-39860",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including use-after-free in Bluetooth, flaws in AppArmor LSM, branch predictor isolation (VMSCAPE), and AMD Zen CPU microcode loading were fixed across various Linux kernel versions and SUSE Enterprise products to address privilege escalation, denial of service, and information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39860 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39860.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39860"
},
{
"cve": "CVE-2025-39864",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and issues in AppArmor LSM and AMD CPU microcode verification, were identified and fixed across various Linux kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39864"
},
{
"cve": "CVE-2025-39865",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address critical security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, branch predictor isolation flaws (VMSCAPE), and AMD CPU microcode signature verification issues across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39865.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39865"
},
{
"cve": "CVE-2025-39866",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address critical security vulnerabilities including use-after-free, race conditions, privilege escalation, denial of service, information leaks, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39866.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39866"
},
{
"cve": "CVE-2025-40300",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "other",
"text": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)",
"title": "CWE-402"
},
{
"category": "description",
"text": "Multiple Linux kernel updates address the VMSCAPE vulnerability and numerous other security issues including memory leaks, use-after-free, race conditions, and hardware-specific bugs across various subsystems and SUSE Linux Enterprise product lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40300 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40300.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40300"
},
{
"cve": "CVE-2025-40833",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Certain devices exhibit a null pointer dereference vulnerability in processing specific IPv4 requests, which can lead to a denial of service condition requiring manual system restart.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40833.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40833"
},
{
"cve": "CVE-2025-40946",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "description",
"text": "A vulnerability in multiple BluePlanet device models allows attackers to derive Technical Service credentials from device serial numbers using a CRC16-based algorithm, enabling unauthorized access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40946 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40946.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40946"
},
{
"cve": "CVE-2025-40947",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "A vulnerability in multiple RUGGEDCOM ROX device models below version V2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges due to improper sanitization of user input during feature key installation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40947 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40947.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40947"
},
{
"cve": "CVE-2025-40948",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to read arbitrary files with root privileges via improper input validation in the web server\u0027s JSON-RPC interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40948"
},
{
"cve": "CVE-2025-40949",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "A command injection vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges via the Scheduler functionality in the Web UI.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40949 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40949.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40949"
},
{
"cve": "CVE-2025-43368",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple use-after-free vulnerabilities and memory management issues in WebKitGTK, Safari, iOS, iPadOS, macOS, and Oracle Java SE 8u471-b50 were fixed to prevent crashes, memory corruption, and potential system compromise from malicious web content.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43368 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43368.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-46836",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Net-tools versions up to 2.10 contain multiple stack-based buffer overflow vulnerabilities, including CVE-2025-46836, due to missing bounds checks in interface label handling and unsafe memory operations, potentially allowing arbitrary code execution or crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-46836"
},
{
"cve": "CVE-2025-47219",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affect GStreamer plugins, Oracle Java SE 8u471-b50\u0027s JavaFX gstreamer component, and Oracle Database Server\u0027s GraalVM engine, including heap buffer over-reads and unauthorized data access risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-47219"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Apache Tomcat versions 9.0.0.M1 to 11.0.9 are vulnerable to the MadeYouReset denial of service attack exploiting improper HTTP/2 stream resets, with multiple updates released to address this and other related security and stability issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Expired Pointer Dereference",
"title": "CWE-825"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including heap use after free, type confusion, stack buffer overflow, and integer overflow, can lead to denial of service, crashes, or data manipulation in affected Oracle products and other environments.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49794 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including heap use-after-free, type confusion, stack buffer overflow, integer overflow, and null pointer dereference, can lead to denial of service, crashes, or unauthorized data modification.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-53057",
"cwe": {
"id": "CWE-838",
"name": "Inappropriate Encoding for Output Context"
},
"notes": [
{
"category": "other",
"text": "Inappropriate Encoding for Output Context",
"title": "CWE-838"
},
{
"category": "description",
"text": "Multiple vulnerabilities including CVE-2025-53057, CVE-2025-53066, and CVE-2025-61748 affect Oracle Java SE and OpenJDK versions 8u461 through 25, allowing unauthenticated network attackers to access and modify critical data via APIs with a CVSS score of 5.9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-53057"
},
{
"cve": "CVE-2025-53066",
"notes": [
{
"category": "description",
"text": "Multiple critical vulnerabilities (CVE-2025-53057, CVE-2025-53066, CVE-2025-61748) in Oracle Java SE and GraalVM across versions 8u461, 11.0.28, 17.0.16, 21.0.8, and 25 allow unauthenticated attackers to gain unauthorized access and modify sensitive data via APIs and XML External Entity attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-53066"
},
{
"cve": "CVE-2025-55752",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Multiple Apache Tomcat versions up to 11.0.13 suffer from directory traversal and URL normalization vulnerabilities that allow bypassing security constraints and potential remote code execution via PUT requests, alongside other issues like denial of service and improper input handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-55754",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Apache Tomcat versions up to 11.0.10, 10.1.44, and 9.0.108 include improper neutralization of ANSI escape sequences in log messages, directory traversal with possible remote code execution, denial of service, and other security issues, with fixes in later versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55754 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55754.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-55754"
},
{
"cve": "CVE-2025-61748",
"cwe": {
"id": "CWE-581",
"name": "Object Model Violation: Just One of Equals and Hashcode Defined"
},
"notes": [
{
"category": "other",
"text": "Object Model Violation: Just One of Equals and Hashcode Defined",
"title": "CWE-581"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Oracle Java SE, Oracle GraalVM, NetApp products, IBM Java, and OpenJDK versions 21 and 25 involve unauthorized data modification, encoded string handling, XML External Entity attacks, and certificate handling with CVSS scores up to 3.7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61748 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61748.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-61748"
},
{
"cve": "CVE-2025-61795",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple Apache Tomcat versions up to 11.0.13, 10.1.48, and 9.0.115 contain vulnerabilities including denial of service from delayed cleanup of multipart upload files, directory traversal with possible remote code execution, and improper input neutralization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-61795"
},
{
"cve": "CVE-2026-2673",
"cwe": {
"id": "CWE-757",
"name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)"
},
"notes": [
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "description",
"text": "OpenSSL versions 3.5.x and 3.6.x contain a TLS 1.3 key exchange group selection flaw involving the \u0027DEFAULT\u0027 keyword that affects post-quantum group negotiation, alongside multiple other security vulnerabilities including memory handling and RSA KEM issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-2673 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-2673.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-2673"
},
{
"cve": "CVE-2026-21925",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"notes": [
{
"category": "other",
"text": "Key Exchange without Entity Authentication",
"title": "CWE-322"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM RMI components across various versions allow unauthenticated network attackers to gain unauthorized access, with updates addressing security flaws in RMI, AWT/JavaFX, Networking, and Security components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21925 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21925.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21925"
},
{
"cve": "CVE-2026-21932",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM components including RMI, AWT, JavaFX, Networking, and Security allow unauthenticated remote attackers to compromise data integrity and execute attacks across various supported Java versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21932 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21932.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21932"
},
{
"cve": "CVE-2026-21933",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM components across various versions allow unauthenticated remote attackers to access, modify data, execute code, or redirect users, with updates addressing issues in RMI, AWT/JavaFX, Networking, and Security components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21933 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21933.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21933"
},
{
"cve": "CVE-2026-21945",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "Multiple critical vulnerabilities in Oracle Java SE and GraalVM affect components such as RMI, AWT/JavaFX, Networking, and Security, allowing unauthenticated remote attackers to cause denial of service, execute code, steal information, or modify files across various Java versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21945 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21945.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21945"
},
{
"cve": "CVE-2026-21947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Oracle Java SE JavaFX 8u471-b50 contains a difficult-to-exploit vulnerability allowing unauthenticated network attackers with user interaction to modify data in sandboxed applications, while GraalVM Multilingual Engine has a non-exploitable security-in-depth issue in Oracle Database Server.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21947 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21947.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21947"
},
{
"cve": "CVE-2026-22924",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 versions below V5.0 allows unauthenticated connections and resource exhaustion, potentially disrupting operations and compromising system availability and integrity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-22924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-22924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-22924"
},
{
"cve": "CVE-2026-22925",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 versions below V5.0 allows denial-of-service by exhausting system resources through a high volume of TCP SYN packets.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-22925 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-22925.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-22925"
},
{
"cve": "CVE-2026-25786",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Certain devices fail to properly validate and sanitize PLC/station names on the web interface\u0027s communication parameters page, enabling authenticated users with project download rights to inject malicious scripts executed upon page access by legitimate users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25786 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25786"
},
{
"cve": "CVE-2026-25787",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in the \u0027Motion Control Diagnostics\u0027 web page allows authenticated users with project download rights to inject malicious scripts via improper validation of Technology Object names, enabling script execution in other users\u0027 sessions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25787 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25787.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25787"
},
{
"cve": "CVE-2026-25789",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Certain devices fail to properly validate filenames on their Firmware Update page, allowing remote attackers to execute malicious JavaScript through social engineering, potentially leading to session hijacking or credential theft.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25789 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25789"
},
{
"cve": "CVE-2026-27446",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A missing authentication vulnerability in Apache Artemis and ActiveMQ Artemis Core protocol allows unauthenticated remote attackers to inject or exfiltrate messages by forcing brokers to connect to rogue brokers in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-27446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-27446"
},
{
"cve": "CVE-2026-27662",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "other",
"text": "Initialization of a Resource with an Insecure Default",
"title": "CWE-1188"
},
{
"category": "description",
"text": "Affected devices inadequately restrict web browser access via the Control Panel, enabling unauthenticated attackers to gain unauthorized access and potentially exploit system vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27662 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-27662.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-27662"
},
{
"cve": "CVE-2026-28387",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple OpenSSL versions contain critical vulnerabilities including use-after-free in DANE client code, NULL pointer dereferences, heap buffer overflows, and RSA KEM failure handling issues, affecting TLS and cryptographic operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28387 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28387"
},
{
"cve": "CVE-2026-28388",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability in OpenSSL\u0027s delta CRL processing can cause application crashes and Denial of Service, with exploitation requiring specific conditions and assessed as low severity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28388 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28388.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28388"
},
{
"cve": "CVE-2026-28389",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including NULL pointer dereferences in CMS KeyAgreeRecipientInfo processing, use-after-free, heap buffer overflow, and TLS 1.3 key agreement issues can cause application crashes and Denial of Service, affecting various OpenSSL versions and some NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28389 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28389.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28389"
},
{
"cve": "CVE-2026-28390",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability (CVE-2026-28390) in OpenSSL occurs during processing of crafted CMS EnvelopedData messages with KeyTransportRecipientInfo using RSA-OAEP, potentially causing application crashes and Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28390"
},
{
"cve": "CVE-2026-31789",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including a heap buffer overflow in hexadecimal conversion on 32-bit platforms, use-after-free, NULL pointer dereferences, TLS 1.3 key agreement issues, and RSA KEM failure handling have been identified, affecting various versions and products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31789 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-31789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-31789"
},
{
"cve": "CVE-2026-31790",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "description",
"text": "OpenSSL\u0027s RSASVE key encapsulation vulnerability (CVE-2026-31790) allows sensitive data leakage from uninitialized memory due to improper handling of RSA_public_encrypt() failures and invalid RSA public key validation, affecting multiple products including Oracle Database Server and NetApp devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-31790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-31790"
},
{
"cve": "CVE-2026-33862",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Multiple versions of Teamcenter contain a vulnerability where improper encoding or filtering of user-supplied data allows attackers to inject malicious code that executes when other users access the affected content.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33862 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-33862.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-33862"
},
{
"cve": "CVE-2026-33893",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "description",
"text": "Multiple versions of Teamcenter contain hardcoded obfuscation keys embedded in the application, which attackers can extract to gain unauthorized access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-33893.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-33893"
},
{
"cve": "CVE-2026-40175",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Dynamically-Determined Object Attributes",
"title": "CWE-915"
},
{
"category": "description",
"text": "Axios versions prior to 1.15.0 and 0.3.1 contain a prototype pollution vulnerability exploitable via a header injection gadget chain, enabling escalation to remote code execution or full cloud compromise including AWS IMDSv2 bypass.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-40175 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40175.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-40175"
},
{
"cve": "CVE-2026-41125",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "description",
"text": "An SQL injection vulnerability in the KACO Meteor server of blueplanet devices allows an authorized local network attacker to escalate privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41125 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41125.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-41125"
},
{
"cve": "CVE-2026-41551",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "A path traversal vulnerability in ROS# versions prior to V2.2.2 allows remote attackers to access arbitrary files due to improper sanitization of user input.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-41551"
},
{
"cve": "CVE-2026-44411",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "other",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "description",
"text": "A vulnerability in Solid Edge SE2026 versions before V226.0 Update 5 allows remote code execution via uninitialized pointer access during parsing of specially crafted PAR files.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-44411 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-44411.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-44411"
},
{
"cve": "CVE-2026-44412",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "A stack-based buffer overflow vulnerability in Solid Edge SE2026 (all versions before V226.0 Update 5) when parsing specially crafted PAR files could enable code execution within the current process context.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-44412 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-44412.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-44412"
}
]
}
RHSA-2026:3955
Vulnerability from csaf_redhat - Published: 2026-03-05 21:59 - Updated: 2026-04-30 07:29A flaw was found in Apache Artemis and Apache ActiveMQ Artemis. An unauthenticated remote attacker can exploit a missing authentication for critical function vulnerability by using the Core protocol. This allows the attacker to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. The primary consequence is the potential for message injection into any queue and/or message exfiltration from any queue via the rogue broker.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat AMQ Broker 7.12.6
Red Hat / Red Hat JBoss AMQ
|
cpe:/a:redhat:amq_broker:7.12
|
— |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Broker 7.12.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.\n\nThis release of Red Hat AMQ Broker 7.12.6 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* (CVE-2026-27446) artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3955",
"url": "https://access.redhat.com/errata/RHSA-2026:3955"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification#important",
"url": "https://access.redhat.com/security/updates/classification#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.12.6",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.12.6"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_amq_broker/7.12",
"url": "https://docs.redhat.com/en/documentation/red_hat_amq_broker/7.12"
},
{
"category": "external",
"summary": "2444320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444320"
},
{
"category": "external",
"summary": "ENTMQBR-10147",
"url": "https://issues.redhat.com/browse/ENTMQBR-10147"
},
{
"category": "external",
"summary": "ENTMQBR-10166",
"url": "https://issues.redhat.com/browse/ENTMQBR-10166"
},
{
"category": "external",
"summary": "ENTMQBR-10169",
"url": "https://issues.redhat.com/browse/ENTMQBR-10169"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3955.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.12.6 release and security update",
"tracking": {
"current_release_date": "2026-04-30T07:29:49+00:00",
"generator": {
"date": "2026-04-30T07:29:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:3955",
"initial_release_date": "2026-03-05T21:59:31+00:00",
"revision_history": [
{
"date": "2026-03-05T21:59:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T21:59:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T07:29:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AMQ Broker 7.12.6",
"product": {
"name": "Red Hat AMQ Broker 7.12.6",
"product_id": "Red Hat AMQ Broker 7.12.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_broker:7.12"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss AMQ"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27446",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"discovery_date": "2026-03-04T07:02:26.064000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444320"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Artemis and Apache ActiveMQ Artemis. An unauthenticated remote attacker can exploit a missing authentication for critical function vulnerability by using the Core protocol. This allows the attacker to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. The primary consequence is the potential for message injection into any queue and/or message exfiltration from any queue via the rogue broker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.artemis:artemis-server: org.apache.activemq:artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT vulnerability in Apache Artemis and Apache ActiveMQ Artemis allows an unauthenticated remote attacker to inject or exfiltrate messages by forcing a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Broker 7.12.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27446"
},
{
"category": "external",
"summary": "RHBZ#2444320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444320"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27446"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg",
"url": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg"
}
],
"release_date": "2026-03-04T06:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T21:59:31+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Broker 7.12.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3955"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict Core protocol support on acceptors receiving connections from untrusted sources. The default \"artemis\" acceptor on port 61616 supports all protocols, including Core. Modify the acceptor URL to explicitly exclude the Core protocol using the \"protocols\" URL parameter. Alternatively, configure two-way SSL with certificate-based authentication to prevent unauthenticated exploitation. A service restart or reload may be required for changes to take effect.",
"product_ids": [
"Red Hat AMQ Broker 7.12.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Broker 7.12.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.artemis:artemis-server: org.apache.activemq:artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication"
}
]
}
RHSA-2026:3957
Vulnerability from csaf_redhat - Published: 2026-03-06 06:15 - Updated: 2026-04-30 07:29A flaw was found in Apache Artemis and Apache ActiveMQ Artemis. An unauthenticated remote attacker can exploit a missing authentication for critical function vulnerability by using the Core protocol. This allows the attacker to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. The primary consequence is the potential for message injection into any queue and/or message exfiltration from any queue via the rogue broker.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat AMQ Broker 7.13.4
Red Hat / Red Hat JBoss AMQ
|
cpe:/a:redhat:amq_broker:7.13
|
— |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Broker 7.13.4 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.\n\nThis release of Red Hat AMQ Broker 7.13.4 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* (CVE-2026-27446) artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3957",
"url": "https://access.redhat.com/errata/RHSA-2026:3957"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification#important",
"url": "https://access.redhat.com/security/updates/classification#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.13.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.13.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_amq_broker/7.13",
"url": "https://docs.redhat.com/en/documentation/red_hat_amq_broker/7.13"
},
{
"category": "external",
"summary": "2444320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444320"
},
{
"category": "external",
"summary": "ENTMQBR-10250",
"url": "https://issues.redhat.com/browse/ENTMQBR-10250"
},
{
"category": "external",
"summary": "ENTMQBR-10256",
"url": "https://issues.redhat.com/browse/ENTMQBR-10256"
},
{
"category": "external",
"summary": "ENTMQBR-10317",
"url": "https://issues.redhat.com/browse/ENTMQBR-10317"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3957.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.13.4 release and security update",
"tracking": {
"current_release_date": "2026-04-30T07:29:49+00:00",
"generator": {
"date": "2026-04-30T07:29:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:3957",
"initial_release_date": "2026-03-06T06:15:07+00:00",
"revision_history": [
{
"date": "2026-03-06T06:15:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-06T06:15:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T07:29:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AMQ Broker 7.13.4",
"product": {
"name": "Red Hat AMQ Broker 7.13.4",
"product_id": "Red Hat AMQ Broker 7.13.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_broker:7.13"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss AMQ"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27446",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"discovery_date": "2026-03-04T07:02:26.064000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444320"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Artemis and Apache ActiveMQ Artemis. An unauthenticated remote attacker can exploit a missing authentication for critical function vulnerability by using the Core protocol. This allows the attacker to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. The primary consequence is the potential for message injection into any queue and/or message exfiltration from any queue via the rogue broker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.artemis:artemis-server: org.apache.activemq:artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT vulnerability in Apache Artemis and Apache ActiveMQ Artemis allows an unauthenticated remote attacker to inject or exfiltrate messages by forcing a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Broker 7.13.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27446"
},
{
"category": "external",
"summary": "RHBZ#2444320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444320"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27446"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg",
"url": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg"
}
],
"release_date": "2026-03-04T06:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-06T06:15:07+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Broker 7.13.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3957"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict Core protocol support on acceptors receiving connections from untrusted sources. The default \"artemis\" acceptor on port 61616 supports all protocols, including Core. Modify the acceptor URL to explicitly exclude the Core protocol using the \"protocols\" URL parameter. Alternatively, configure two-way SSL with certificate-based authentication to prevent unauthenticated exploitation. A service restart or reload may be required for changes to take effect.",
"product_ids": [
"Red Hat AMQ Broker 7.13.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Broker 7.13.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.artemis:artemis-server: org.apache.activemq:artemis-server: Apache Artemis, Apache ActiveMQ Artemis: Message injection and exfiltration due to missing authentication"
}
]
}
FKIE_CVE-2026-27446
Vulnerability from fkie_nvd - Published: 2026-03-04 09:15 - Updated: 2026-05-12 13:17| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/03/03/4 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/03/04/1 | Mailing List, Third Party Advisory | |
| 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | https://cert-portal.siemens.com/productcert/html/ssa-085541.html |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | activemq_artemis | * | |
| apache | artemis | 2.50.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC62090-71FA-45A2-A519-B2C3B47D4262",
"versionEndIncluding": "2.44.0",
"versionStartIncluding": "2.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:artemis:2.50.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF62B6D-CD60-43D0-9740-AC011CC1FBFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\n\n- incoming Core protocol connections from untrusted sources to the broker\n\n- outgoing Core protocol connections from the broker to untrusted targets\n\nThis issue affects:\n\n- Apache Artemis from 2.50.0 through 2.51.0\n\n- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\n\nUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\n\nThe issue can be mitigated by one of the following:\n\n- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \"artemis\" acceptor listening on port 61616. See the \"protocols\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\n\n- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.\n\n- Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u00a00xfffffff0. Documentation for interceptors is available at\u00a0 https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html ."
},
{
"lang": "es",
"value": "Vulnerabilidad de Autenticaci\u00f3n Faltante para Funci\u00f3n Cr\u00edtica (CWE-306) en Apache Artemis, Apache ActiveMQ Artemis. Un atacante remoto no autenticado puede usar el protocolo Core para forzar a un broker objetivo a establecer una conexi\u00f3n de federaci\u00f3n Core saliente con un broker malicioso controlado por el atacante. Esto podr\u00eda resultar potencialmente en la inyecci\u00f3n de mensajes en cualquier cola y/o la exfiltraci\u00f3n de mensajes de cualquier cola a trav\u00e9s del broker malicioso. Esto afecta a entornos que permiten ambos:\n\n- conexiones de protocolo Core entrantes desde fuentes no confiables al broker\n\n- conexiones de protocolo Core salientes desde el broker a objetivos no confiables\n\nEste problema afecta a:\n\n- Apache Artemis desde 2.50.0 hasta 2.51.0\n\n- Apache ActiveMQ Artemis desde 2.11.0 hasta 2.44.0.\n\nSe recomienda a los usuarios actualizar a la versi\u00f3n 2.52.0 de Apache Artemis, que corrige el problema.\n\nEl problema puede mitigarse mediante cualquiera de las siguientes opciones:\n\n- Eliminar el soporte del protocolo Core de cualquier aceptor que reciba conexiones de fuentes no confiables. Las conexiones de protocolo Core entrantes son compatibles por defecto a trav\u00e9s del aceptor \u0027artemis\u0027 que escucha en el puerto 61616. Consulte el par\u00e1metro URL \u0027protocols\u0027 configurado para el aceptor. Una URL de aceptor sin este par\u00e1metro soporta todos los protocolos por defecto, incluyendo Core.\n\n- Usar SSL bidireccional (es decir, autenticaci\u00f3n basada en certificados) para forzar a cada cliente a presentar el certificado SSL adecuado al establecer una conexi\u00f3n antes de que se intente cualquier handshake de protocolo de mensajes. Esto evitar\u00e1 la explotaci\u00f3n no autenticada de esta vulnerabilidad."
}
],
"id": "CVE-2026-27446",
"lastModified": "2026-05-12T13:17:33.067",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@apache.org",
"type": "Secondary"
}
]
},
"published": "2026-03-04T09:15:56.837",
"references": [
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2026/03/03/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2026/03/04/1"
},
{
"source": "0b142b55-0307-4c5a-b3c9-f314f3fb7c5e",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-085541.html"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
SSA-085541
Vulnerability from csaf_siemens - Published: 2026-05-12 00:00 - Updated: 2026-05-12 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Opcenter RDnL
Siemens / Opcenter RDnL
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Vendor Fix
|
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Opcenter RDnL is affected by missing authentication in critical function in \u2018ActiveMQ Artemis\u2019. An unauthenticated attacker within the adjacent network could use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in availability impacts or message injection into any queue via the rogue broker. Breaking the integrity of a message has a low impact due to missing auto refresh functionality and it does not contain any confidential information.\n\nActiveMQ Artemis has released a new version and Siemens recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-085541: Missing Authentication in Critical Function in ActiveMQ Artemis (CVE-2026-27446) in Opcenter RDnL - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-085541.html"
},
{
"category": "self",
"summary": "SSA-085541: Missing Authentication in Critical Function in ActiveMQ Artemis (CVE-2026-27446) in Opcenter RDnL - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-085541.json"
}
],
"title": "SSA-085541: Missing Authentication in Critical Function in ActiveMQ Artemis (CVE-2026-27446) in Opcenter RDnL",
"tracking": {
"current_release_date": "2026-05-12T00:00:00.000Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-085541",
"initial_release_date": "2026-05-12T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-12T00:00:00.000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Opcenter RDnL",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Opcenter RDnL"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27446",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\r\n\r\n- incoming Core protocol connections from untrusted sources to the broker\r\n\r\n- outgoing Core protocol connections from the broker to untrusted targets",
"title": "Summary"
},
{
"category": "summary",
"text": "ActiveMQ Artemis is used for Async processing between different web applications. Any message processed by a consumer will apply schema validation first. Message sent by Opcenter RD\u0026L to ActiveMQ does not contain any confidential information. Breaking the integrity of a message has a low impact (missing auto refresh functionality). Access to ActiveMQ is only allowed within the Data Center. Inbound connections to the Data Center to port 61616 (default) should be blocked.",
"title": "For Opcenter RDnL"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte)\u00a00xfffffff0. Documentation for interceptors is available at\u00a0 https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \"artemis\" acceptor listening on port 61616. See the \"protocols\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to Apache Artemis version 2.52.0 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-27446"
}
]
}
GHSA-FW88-PF9M-P947
Vulnerability from github – Published: 2026-03-04 09:31 – Updated: 2026-03-05 15:28Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:
-
Incoming Core protocol connections from untrusted sources to the broker
-
Outgoing Core protocol connections from the broker to untrusted targets
This issue affects:
-
Apache Artemis from 2.50.0 through 2.51.0
-
Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.
Users are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.
The issue can be mitigated by either of the following:
-
Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the "artemis" acceptor listening on port 61616. See the "protocols" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.
-
Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.activemq:artemis-server"
},
"ranges": [
{
"events": [
{
"introduced": "2.11.0"
},
{
"last_affected": "2.44.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.artemis:artemis-server"
},
"ranges": [
{
"events": [
{
"introduced": "2.50.0"
},
{
"fixed": "2.52.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-27446"
],
"database_specific": {
"cwe_ids": [
"CWE-306"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-04T22:37:18Z",
"nvd_published_at": "2026-03-04T09:15:56Z",
"severity": "CRITICAL"
},
"details": "Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both:\n\n- Incoming Core protocol connections from untrusted sources to the broker\n\n- Outgoing Core protocol connections from the broker to untrusted targets\n\nThis issue affects:\n\n- Apache Artemis from 2.50.0 through 2.51.0\n\n- Apache ActiveMQ Artemis from 2.11.0 through 2.44.0.\n\nUsers are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue.\n\nThe issue can be mitigated by either of the following:\n\n- Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the \"artemis\" acceptor listening on port 61616. See the \"protocols\" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core.\n\n- Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability.",
"id": "GHSA-fw88-pf9m-p947",
"modified": "2026-03-05T15:28:06Z",
"published": "2026-03-04T09:31:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27446"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/artemis"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/03/03/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/03/04/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L",
"type": "CVSS_V4"
}
],
"summary": "Apache Artemis and Apache ActiveMQ Artemis are Missing Authentication for Critical Functions"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.