{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T18:18:00.516","vulnerabilities":[{"cve":{"id":"CVE-2025-6217","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-06-21T01:15:28.990","lastModified":"2025-08-18T15:51:25.787","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"PEAK-System Driver PCANFD_ADD_FILTERS Time-Of-Check Time-Of-Use Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of PEAK-System Driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the PCANFD_ADD_FILTERS IOCTL. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-24161."},{"lang":"es","value":"Vulnerabilidad de divulgación de información de tiempo de uso y verificación PCANFD_ADD_FILTERS del controlador PEAK-System. Esta vulnerabilidad permite a atacantes locales divulgar información confidencial sobre las instalaciones afectadas del controlador PEAK-System. Para explotar esta vulnerabilidad, un atacante debe primero ejecutar código con privilegios bajos en el sistema objetivo. La falla específica se encuentra en la gestión de la IOCTL PCANFD_ADD_FILTERS. El problema se debe a la falta de un bloqueo adecuado al realizar operaciones en un objeto. Un atacante puede aprovechar esto, junto con otras vulnerabilidades, para ejecutar código arbitrario en el contexto del kernel. Anteriormente, se denominaba ZDI-CAN-24161."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":2.5,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":1.4}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","baseScore":3.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.0,"impactScore":1.4}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-367"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:peak-system:device_driver:8.18.0:*:*:*:*:*:*:*","matchCriteriaId":"8BB9ED56-4794-4930-9724-9BC59371DC73"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-408/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}