{
  "metadata": {
    "@context": "https://openvex.dev/ns/v0.2.0",
    "@id": "https://packages.broadcom.com/photon/photon_cve_metadata/cve/2025/CVE-2025-45311",
    "author": "VMware Photon OS",
    "timestamp": "2026-04-22T05:34:28.454699",
    "version": 1
  },
  "statements": [
    {
      "vulnerability": {
        "@id": "https://nvd.nist.gov/vuln/detail/CVE-2025-45311",
        "name": "CVE-2025-45311"
      },
      "products": [
        {
          "@id": "pkg:rpm/photon/fail2ban?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban?arch=aarch64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-hostsdeny?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-hostsdeny?arch=aarch64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-devel?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-devel?arch=aarch64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-mail?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-mail?arch=aarch64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-sendmail?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-sendmail?arch=aarch64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-systemd?arch=x86_64"
        },
        {
          "@id": "pkg:rpm/photon/fail2ban-systemd?arch=aarch64"
        }
      ],
      "status": "not_affected",
      "status_notes": "Unprivileged users do not have permission to run fail2ban-client with elevated rights by default on Photon OS, and therefore cannot trigger the behavior described in the CVE."
    }
  ]
}