Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-pqe1-ewjj-uqbn
Vulnerability ID VCID-pqe1-ewjj-uqbn
Aliases CVE-2025-14905
Summary 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:3189
ssvc Track https://access.redhat.com/errata/RHSA-2026:3189
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:3208
ssvc Track https://access.redhat.com/errata/RHSA-2026:3208
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:3379
ssvc Track https://access.redhat.com/errata/RHSA-2026:3379
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:3504
ssvc Track https://access.redhat.com/errata/RHSA-2026:3504
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:4207
ssvc Track https://access.redhat.com/errata/RHSA-2026:4207
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:4661
ssvc Track https://access.redhat.com/errata/RHSA-2026:4661
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:4720
ssvc Track https://access.redhat.com/errata/RHSA-2026:4720
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5196
ssvc Track https://access.redhat.com/errata/RHSA-2026:5196
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5511
ssvc Track https://access.redhat.com/errata/RHSA-2026:5511
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5512
ssvc Track https://access.redhat.com/errata/RHSA-2026:5512
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5513
ssvc Track https://access.redhat.com/errata/RHSA-2026:5513
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5514
ssvc Track https://access.redhat.com/errata/RHSA-2026:5514
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5568
ssvc Track https://access.redhat.com/errata/RHSA-2026:5568
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5569
ssvc Track https://access.redhat.com/errata/RHSA-2026:5569
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5576
ssvc Track https://access.redhat.com/errata/RHSA-2026:5576
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5597
ssvc Track https://access.redhat.com/errata/RHSA-2026:5597
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:5598
ssvc Track https://access.redhat.com/errata/RHSA-2026:5598
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:6220
ssvc Track https://access.redhat.com/errata/RHSA-2026:6220
cvssv3.1 7.2 https://access.redhat.com/errata/RHSA-2026:6268
ssvc Track https://access.redhat.com/errata/RHSA-2026:6268
cvssv3 7.2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json
cvssv3.1 7.2 https://access.redhat.com/security/cve/CVE-2025-14905
ssvc Track https://access.redhat.com/security/cve/CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2025-14905
cvssv3.1 7.2 https://bugzilla.redhat.com/show_bug.cgi?id=2423624
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2423624
cvssv3.1 7.2 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json
https://api.first.org/data/v1/epss?cve=CVE-2025-14905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14905
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1130910 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130910
2423624 https://bugzilla.redhat.com/show_bug.cgi?id=2423624
cpe:/a:redhat:directory_server:11.9::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8
cpe:/a:redhat:directory_server:12 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
cpe:/a:redhat:directory_server:13 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13
cpe:/a:redhat:directory_server:13.1::el10 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13.1::el10
cpe:/a:redhat:directory_server_e4s:11.5::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8
cpe:/a:redhat:directory_server_e4s:11.7::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.7::el8
cpe:/a:redhat:directory_server_e4s:12.2::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:12.2::el9
cpe:/a:redhat:directory_server_eus:12.4::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9
cpe:/a:redhat:enterprise_linux:8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:enterprise_linux:9::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:enterprise_linux:9::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
cpe:/a:redhat:rhel_aus:8.2::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
cpe:/a:redhat:rhel_aus:8.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
cpe:/a:redhat:rhel_aus:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
cpe:/a:redhat:rhel_e4s:9.0::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
cpe:/a:redhat:rhel_e4s:9.2::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/a:redhat:rhel_eus:9.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
cpe:/a:redhat:rhel_eus:9.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/a:redhat:rhel_eus:9.6::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
cpe:/a:redhat:rhel_tus:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
cpe:/a:redhat:rhel_tus:8.8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
cpe:/o:redhat:enterprise_linux:10.1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
cpe:/o:redhat:enterprise_linux:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux_eus:10.0 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
cpe:/o:redhat:rhel_els:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
CVE-2025-14905 https://access.redhat.com/security/cve/CVE-2025-14905
RHSA-2026:3189 https://access.redhat.com/errata/RHSA-2026:3189
RHSA-2026:3208 https://access.redhat.com/errata/RHSA-2026:3208
RHSA-2026:3379 https://access.redhat.com/errata/RHSA-2026:3379
RHSA-2026:3504 https://access.redhat.com/errata/RHSA-2026:3504
RHSA-2026:4207 https://access.redhat.com/errata/RHSA-2026:4207
RHSA-2026:4661 https://access.redhat.com/errata/RHSA-2026:4661
RHSA-2026:4720 https://access.redhat.com/errata/RHSA-2026:4720
RHSA-2026:5196 https://access.redhat.com/errata/RHSA-2026:5196
RHSA-2026:5511 https://access.redhat.com/errata/RHSA-2026:5511
RHSA-2026:5512 https://access.redhat.com/errata/RHSA-2026:5512
RHSA-2026:5513 https://access.redhat.com/errata/RHSA-2026:5513
RHSA-2026:5514 https://access.redhat.com/errata/RHSA-2026:5514
RHSA-2026:5568 https://access.redhat.com/errata/RHSA-2026:5568
RHSA-2026:5569 https://access.redhat.com/errata/RHSA-2026:5569
RHSA-2026:5576 https://access.redhat.com/errata/RHSA-2026:5576
RHSA-2026:5597 https://access.redhat.com/errata/RHSA-2026:5597
RHSA-2026:5598 https://access.redhat.com/errata/RHSA-2026:5598
RHSA-2026:6220 https://access.redhat.com/errata/RHSA-2026:6220
RHSA-2026:6268 https://access.redhat.com/errata/RHSA-2026:6268
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:3189
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:3189
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:3208
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:3208
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:3379
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:3379
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:3504
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:3504
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4207
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:4207
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4661
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:4661
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4720
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:4720
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5196
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5196
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5511
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5511
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5512
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5512
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5513
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5513
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5514
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5514
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5568
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5568
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5569
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5569
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5576
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5576
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5597
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5597
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5598
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:5598
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:6220
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:6220
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:6268
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/errata/RHSA-2026:6268
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/security/cve/CVE-2025-14905
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://access.redhat.com/security/cve/CVE-2025-14905
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2423624
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2423624
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.64373
EPSS Score 0.00466
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:31:20.098476+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json 38.0.0