{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T11:02:51.664","vulnerabilities":[{"cve":{"id":"CVE-2025-1095","sourceIdentifier":"psirt@us.ibm.com","published":"2025-04-08T16:15:24.910","lastModified":"2025-09-29T16:15:37.443","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029."},{"lang":"es","value":"IBM Personal Communications v14 y v15 incluyen un servicio de Windows vulnerable a la escalada de privilegios locales (LPE). Esta vulnerabilidad permite a cualquier usuario conectado interactivamente en el equipo objetivo ejecutar comandos con privilegios completos en el contexto de NT AUTHORITY\\SYSTEM. Esto permite que un atacante con pocos privilegios escale sus privilegios. Esta vulnerabilidad se debe a una corrección incompleta para CVE-2024-25029."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-420"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:personal_communications:14.0.0:*:*:*:*:*:*:*","matchCriteriaId":"4051DE80-1340-49B1-B7A3-F8C2ED5C4988"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:personal_communications:15.0.0:*:*:*:*:*:*:*","matchCriteriaId":"931D6B27-77ED-4C9C-8440-8F18DEEDDF23"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7230335","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}