Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.1:alpha:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.3:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.5:*:*:*:*:linux:*:* |
Thu, 18 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Windscribe Windscribe windscribe |
|
| Vendors & Products |
Linux
Linux linux Windscribe Windscribe windscribe |
Wed, 10 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8. | |
| Title | Windscribe for Linux 'changeMTU' local privilege escalation | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-12-18T19:54:18.428Z
Reserved: 2025-11-18T07:05:42.386Z
Link: CVE-2025-65199
Updated: 2025-12-18T19:54:15.756Z
Status : Analyzed
Published: 2025-12-10T19:16:34.957
Modified: 2025-12-23T15:27:16.247
Link: CVE-2025-65199
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:20:09Z