Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 23 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.1:alpha:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.3:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.5:*:*:*:*:linux:*:* |
Thu, 18 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Windscribe Windscribe windscribe |
|
| Vendors & Products |
Linux
Linux linux Windscribe Windscribe windscribe |
Wed, 10 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8. | |
| Title | Windscribe for Linux 'changeMTU' local privilege escalation | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-12-18T19:54:18.428Z
Reserved: 2025-11-18T07:05:42.386Z
Link: CVE-2025-65199
Updated: 2025-12-18T19:54:15.756Z
Status : Analyzed
Published: 2025-12-10T19:16:34.957
Modified: 2025-12-23T15:27:16.247
Link: CVE-2025-65199
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:20:09Z