Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-34189

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application versions prior to 20.0.1330 (macOS/Linux client deployments) contain a vulnerability in the local inter-process communication (IPC) mechanism. The software stores IPC request and response files inside /opt/PrinterInstallerClient/tmp with world-readable and world-writable permissions. Any local user can craft malicious request files that are processed by privileged daemons, leading to unauthorized actions being executed in other user sessions. This breaks user session isolation, potentially allowing local attackers to hijack sessions, perform unintended actions in the context of other users, and impact system integrity and availability.
Gravedad CVSS v4.0: MEDIA
Última modificación:
19/09/2025

CVE-2025-34190

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (macOS/Linux client deployments) are vulnerable to an authentication bypass in PrinterInstallerClientService. The service requires root privileges for certain administrative operations, but these checks rely on calls to geteuid(). By preloading a malicious shared object overriding geteuid(), a local attacker can trick the service into believing it is running with root privileges. This bypass enables execution of administrative commands (e.g., enabling debug mode, managing configurations, or invoking privileged features) without proper authorization. While some actions requiring write access to protected files may still fail, the flaw effectively breaks the intended security model of the inter-process communication (IPC) system, allowing local attackers to escalate privileges and compromise system integrity. NOTE: This vulnerability has been addressed, but an affected version range is not yet fully determined. We will update this record as soon as the vendor provides confirmed version information.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/09/2025

CVE-2025-34191

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/09/2025

CVE-2025-34192

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.893 and Application versions prior to 20.0.2140 (macOS/Linux client deployments) are built against OpenSSL 1.0.2h-fips (released May 2016), which has been end-of-life since 2019 and is no longer supported by the OpenSSL project. Continued use of this outdated cryptographic library exposes deployments to known vulnerabilities that are no longer patched, weakening the overall security posture. Affected daemons may emit deprecation warnings and rely on cryptographic components with unresolved security flaws, potentially enabling attackers to exploit weaknesses in TLS/SSL processing or cryptographic operations.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
19/09/2025

CVE-2025-34193

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives — for example from crafted driver content or maliciously crafted inputs — can be turned into remote or local code execution and privilege escalation to SYSTEM.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/09/2025

CVE-2025-34194

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\SYSTEM inside a directory under the control of the local user (C:\Users\%USER%\AppData\Local\Temp\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system. NOTE: This vulnerability has been addressed, but an affected version range is not yet fully determined. This record will be updated when the vendor provides confirmed version information.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/09/2025

CVE-2024-13990

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** MicroWorld eScan AV's update mechanism failed to ensure authenticity and integrity of updates: update packages were delivered and accepted without robust cryptographic verification. As a result, an on-path attacker could perform a man-in-the-middle (MitM) attack and substitute malicious update payloads for legitimate ones. The eScan AV client accepted these substituted packages and executed or loaded their components (including sideloaded DLLs and Java/installer payloads), enabling remote code execution on affected systems. MicroWorld eScan confirmed remediation of the update mechanism on 2023-07-31 but versioning details are unavailable. NOTE: MicroWorld eScan disputes the characterization in third-party reports, stating the issue relates to 2018–2019 and that controls were implemented then.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
19/09/2025

CVE-2025-26514

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a Reflected Cross-Site Scripting vulnerability. <br /> Successful exploit could allow an attacker to view or modify <br /> configuration settings or add or modify user accounts but requires the <br /> attacker to know specific information about the target instance and then<br /> trick a privileged user into clicking a specially crafted link.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/09/2025

CVE-2025-26515

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 without <br /> Single Sign-on enabled are susceptible to a Server-Side Request Forgery <br /> (SSRF) vulnerability. Successful exploit could allow an unauthenticated <br /> attacker to change the password of any Grid Manager or Tenant Manager <br /> non-federated user.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/09/2025

CVE-2025-26516

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a Denial of Service vulnerability. Successful exploit <br /> could allow an unauthenticated attacker to cause a Denial of Service on <br /> the Admin node.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/09/2025

CVE-2025-26517

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a privilege escalation vulnerability. Successful exploit <br /> could allow an unauthorized authenticated attacker to discover Grid node<br /> names and IP addresses or modify Storage Grades.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/09/2025

CVE-2025-34188

Fecha de publicación:
19/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (macOS/Linux client deployments) contain a vulnerability in the local logging mechanism. Authentication session tokens, including PHPSESSID, XSRF-TOKEN, and laravel_session, are stored in cleartext within world-readable log files. Any local user with access to the machine can extract these session tokens and use them to authenticate remotely to the SaaS environment, bypassing normal login credentials, potentially leading to unauthorized system access and exposure of sensitive information.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/09/2025