CVSS v3.1 Statistics for Samsung Mobile as of 02/11/2026
1172
320
40
246
Reference
0-69.9%
|
|
Contributor |
76.9
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2023-21477 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | ≠ | Integrity (I) None | No integrity impacts identified | |
| Availability (A) None | Availability (A) None | |||
| CVE-2024-20851 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2024-20871 (6 of 8) | Attack Vector (AV) Physical | Attack Vector (AV) Physical | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2024-20872 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | ≠ | Integrity (I) Low | Integrity impact appears non-critical | |
| Availability (A) High | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2024-20887 (5 of 8) | Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | Applied AV:N due to lack of available Information for NVD Analyst |
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) High | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2024-34598 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2024-34670 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-34671 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-34672 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-49417 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-49422 (7 of 8) | Attack Vector (AV) Physical | Attack Vector (AV) Physical | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) Low | Availability (A) Low | |||
| CVE-2025-20936 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-20941 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20943 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No confidentiality impacts identified | |
| Integrity (I) High | ≠ | Integrity (I) None | No integrity impacts identified | |
| Availability (A) High | Availability (A) High | |||
| CVE-2025-20944 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20945 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20948 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20967 (5 of 8) | Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | Applied AV:N due to lack of available Information for NVD Analyst |
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20968 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20984 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) High | ≠ | Integrity (I) None | No integrity impacts identified | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20985 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | ≠ | Integrity (I) Low | Integrity impact appears non-critical | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20986 (8 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20987 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20988 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20991 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20992 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20993 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-20994 (2 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2025-20995 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
| CVE-2025-20997 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-20998 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-21004 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-21022 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-21045 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-21063 (8 of 8) | Attack Vector (AV) Physical | Attack Vector (AV) Physical | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-21072 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No confidentiality impacts identified | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-21080 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Local attacker typically implies some privilege level needed | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-58477 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) None | No integrity impacts identified | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-58488 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2026-20973 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed |