{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T08:02:30.877","vulnerabilities":[{"cve":{"id":"CVE-2025-1566","sourceIdentifier":"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f","published":"2025-04-16T23:15:44.767","lastModified":"2025-07-08T18:08:30.527","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions."},{"lang":"es","value":"Una fuga de DNS en el sistema VPN nativo del canal de desarrollo de Google ChromeOS en ChromeOS 129.0.6668.36 permite que los observadores de la red expongan consultas DNS de texto simple debido a una falla en la tunelización adecuada del tráfico DNS durante las transiciones de estado de VPN."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-1319"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:chrome_os:16002.23.0:*:*:*:*:*:*:*","matchCriteriaId":"91F38647-41B2-4175-B80D-FF0F05BC9364"}]}]}],"references":[{"url":"https://issues.chromium.org/issues/b/342802975","source":"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f","tags":["Broken Link"]},{"url":"https://issuetracker.google.com/issues/342802975","source":"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f","tags":["Issue Tracking","Mailing List"]}]}}]}