The preliminary findings follow an investigation that began in February 2024 probing features such as “infinite scroll, autoplay, push notifications, and its highly personalised recommender system,” the European Commission said in a press release.
A vulnerability has been found in Endress+Hauser MEAC300-FNADE4 up to 0.16.0 and classified as problematic. This affects an unknown function of the component Apache httpd Webserver. Performing a manipulation results in exposure of information through directory listing.
This vulnerability is identified as CVE-2025-27452. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Endress+Hauser MEAC300-FNADE4 up to 0.16.0. This vulnerability affects unknown code. Performing a manipulation results in improper restriction of rendered ui layers.
This vulnerability is reported as CVE-2025-27455. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Endress+Hauser MEAC300-FNADE4. This issue affects some unknown processing of the component SMB Server. Executing a manipulation can lead to improper restriction of excessive authentication attempts.
This vulnerability appears as CVE-2025-27456. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in Endress+Hauser MEAC300-FNADE4 up to 0.16.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2025-27454. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Endress+Hauser MEAC300-FNADE4. It has been classified as problematic. This affects an unknown part of the component VNC Authentication. This manipulation causes risky cryptographic algorithm.
This vulnerability is tracked as CVE-2025-27458. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in Endress+Hauser MEAC300-FNADE4. The impacted element is an unknown function of the component VNC. The manipulation results in cleartext transmission of sensitive information.
This vulnerability is reported as CVE-2025-27457. The attack can be launched remotely. No exploit exists.
A vulnerability classified as critical was found in Endress+Hauser MEAC300-FNADE4. Affected by this vulnerability is an unknown functionality of the component EPC2 Windows. Executing a manipulation can lead to missing authorization.
This vulnerability is handled as CVE-2025-27461. The physical device can be targeted for the attack. There is not any exploit available.
A vulnerability was found in Linux Kernel up to 5.10.180/5.15.112/6.1.29/6.3.3. It has been declared as critical. The affected element is the function rb_prev of the component netfilter. The manipulation results in use after free.
This vulnerability is reported as CVE-2023-53566. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component qup. Such manipulation leads to memory leak.
This vulnerability is traded as CVE-2023-53567. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.256/5.10.194/5.15.131/6.1.53/6.5.3. It has been rated as critical. Affected by this issue is the function dev_set_name of the component zcrypt. Performing a manipulation results in allocation of resources.
This vulnerability is known as CVE-2023-53568. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.10.179/5.15.110/6.1.27/6.2.14/6.3.1. This affects the function intel_get_crtc_new_encoder of the component i915. Executing a manipulation can lead to state issue.
This vulnerability is handled as CVE-2023-53571. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.45/6.4.10. This affects the function nl80211_parse_mbssid_elems of the component 80211 Interface. This manipulation causes heap-based buffer overflow.
The identification of this vulnerability is CVE-2023-53570. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.24/6.2.11. This vulnerability affects the function cache_ops. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-53573. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.120/6.1.38/6.3.12/6.4.3. It has been rated as critical. The impacted element is the function list_for_each_entry_safe of the component clk. This manipulation causes use after free.
This vulnerability appears as CVE-2023-53572. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Endress+Hauser MEAC300-FNADE4 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation results in cleartext storage of sensitive information.
This vulnerability is identified as CVE-2025-27460. An attack on the physical device is feasible. There is not any exploit available.
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use.