Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.txone.com/psirt/advisories/CVE-2025-14252 |
|
Wed, 07 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech susi |
|
| Vendors & Products |
Advantech
Advantech susi |
Tue, 16 Dec 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to read/write arbitrary memory, I/O ports, and MSRs, resulting in privilege escalation, arbitrary code execution, and information disclosure. This issue affects Advantech SUSI: 5.0.24335 and prior. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TXOne
Published:
Updated: 2026-01-07T15:06:49.701Z
Reserved: 2025-12-08T06:58:53.661Z
Link: CVE-2025-14252
Updated: 2025-12-16T18:51:17.173Z
Status : Deferred
Published: 2025-12-16T06:15:42.557
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14252
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:28Z