Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mbed_tls Vendor: arm

About This Product

mbed_tls is a software product offered by arm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 62 known vulnerabilities affecting arm mbed_tls. This includes 11 critical-severity issues and 20 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2025, indicating a sustained research interest and ongoing security attention. 31 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2015-5291 2015-11-02 2025-04-12 - 6.8 Likely
CVE-2015-8036 2015-11-02 2025-04-12 - 6.8 Likely
CVE-2017-2784 2017-04-20 2025-04-20 8.1 6.8 Likely
CVE-2017-14032 2017-08-30 2025-04-20 8.1 6.8 Likely
CVE-2018-0487 2018-02-13 2024-11-21 9.8 7.5 Likely
CVE-2018-0488 2018-02-13 2024-11-21 9.8 7.5 Likely
CVE-2017-18187 2018-02-14 2024-11-21 9.8 7.5 Likely
CVE-2018-9988 2018-04-10 2024-11-21 7.5 5.0 Likely
CVE-2018-9989 2018-04-10 2024-11-21 7.5 5.0 Likely
CVE-2018-1000520 2018-06-26 2024-11-21 7.5 5.0 Likely
CVE-2018-0497 2018-07-28 2024-11-21 5.9 4.3 Likely
CVE-2018-0498 2018-07-28 2024-11-21 4.7 1.9 Unknown
CVE-2018-19608 2018-12-05 2024-11-21 4.7 1.9 Unknown
CVE-2019-16910 2019-09-26 2024-11-21 5.3 2.6 Unknown
CVE-2019-18222 2020-01-23 2024-11-21 4.7 1.9 Unknown
CVE-2020-10941 2020-03-24 2024-11-21 5.9 4.3 Likely
CVE-2020-10932 2020-04-15 2024-11-21 4.7 1.9 Unknown
CVE-2020-16150 2020-09-02 2024-11-21 5.5 2.1 Unknown
CVE-2021-24119 2021-07-14 2025-11-03 4.9 4.0 Likely
CVE-2020-36421 2021-07-19 2025-12-03 5.3 5.0 Likely
CVE-2020-36422 2021-07-19 2024-11-21 5.3 5.0 Likely
CVE-2020-36423 2021-07-19 2024-11-21 7.5 5.0 Likely
CVE-2020-36424 2021-07-19 2024-11-21 4.7 1.9 Unknown
CVE-2020-36425 2021-07-19 2024-11-21 5.3 4.3 Likely
CVE-2020-36426 2021-07-19 2024-11-21 7.5 5.0 Likely
CVE-2020-36475 2021-08-23 2024-11-21 7.5 5.0 Likely
CVE-2020-36476 2021-08-23 2024-11-21 7.5 5.0 Likely
CVE-2020-36477 2021-08-23 2024-11-21 5.9 4.3 Likely
CVE-2020-36478 2021-08-23 2024-11-21 7.5 5.0 Likely
CVE-2021-44732 2021-12-20 2025-11-03 9.8 7.5 Likely
CVE-2021-45450 2021-12-21 2024-11-21 7.5 5.0 Likely
CVE-2021-45451 2021-12-21 2024-11-21 7.5 5.0 Likely
CVE-2021-43666 2022-03-24 2025-12-02 7.5 5.0 Likely
CVE-2022-35409 2022-07-15 2024-11-21 9.1 - -
CVE-2022-46392 2022-12-15 2025-11-03 5.3 - -
CVE-2022-46393 2022-12-15 2025-04-21 9.8 - -
CVE-2021-36647 2023-01-17 2025-11-03 4.7 - -
CVE-2023-43615 2023-10-07 2024-11-21 7.5 - -
CVE-2023-45199 2023-10-07 2024-11-21 9.8 - -
CVE-2023-52353 2024-01-21 2025-05-30 7.5 - -
CVE-2024-23744 2024-01-21 2025-06-04 7.5 - -
CVE-2024-23170 2024-01-31 2025-11-04 5.5 - -
CVE-2024-23775 2024-01-31 2025-11-04 7.5 - -
CVE-2024-28960 2024-03-29 2025-11-04 8.2 - -
CVE-2024-28755 2024-04-03 2025-06-10 6.5 - -
CVE-2024-28836 2024-04-03 2025-06-27 5.4 - -
CVE-2024-30166 2024-04-03 2025-06-27 9.1 - -
CVE-2024-45157 2024-09-05 2025-03-14 5.1 - -
CVE-2024-45158 2024-09-05 2025-05-16 9.8 - -
CVE-2024-45159 2024-09-05 2025-03-13 9.8 - -
CVE-2024-49195 2024-10-15 2025-05-06 9.8 - -
CVE-2025-27809 2025-03-25 2025-07-17 5.4 - -
CVE-2025-27810 2025-03-25 2025-10-30 5.4 - -
CVE-2025-49600 2025-07-04 2025-07-17 4.9 - -
CVE-2025-49601 2025-07-04 2025-07-17 4.8 - -
CVE-2025-52496 2025-07-04 2025-11-03 7.8 - -
CVE-2025-52497 2025-07-04 2025-11-03 4.8 - -
CVE-2025-48965 2025-07-20 2025-11-03 4.0 - -
CVE-2025-47917 2025-07-20 2025-11-03 8.9 - -
CVE-2025-49087 2025-07-20 2025-08-07 4.0 - -
CVE-2025-54764 2025-10-20 2025-10-31 6.2 - -
CVE-2025-59438 2025-10-21 2025-10-23 5.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for arm mbed_tls by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.