Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
diaenergie Vendor: deltaww

About This Product

diaenergie is a software product offered by deltaww. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 82 known vulnerabilities affecting deltaww diaenergie. This includes 39 critical-severity issues and 34 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2021 to 2025, indicating a recent active security attention. 9 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-32955 2021-08-30 2024-11-21 9.8 7.5 Likely
CVE-2021-32967 2021-08-30 2024-11-21 9.8 10.0 Likely
CVE-2021-32983 2021-08-30 2024-11-21 9.8 10.0 Likely
CVE-2021-32991 2021-08-30 2024-11-21 4.3 4.3 Likely
CVE-2021-33003 2021-08-30 2024-11-21 5.5 2.1 Unknown
CVE-2021-38390 2021-08-30 2024-11-21 9.8 10.0 Likely
CVE-2021-38391 2021-08-30 2024-11-21 9.8 10.0 Likely
CVE-2021-38393 2021-08-30 2024-11-21 9.8 10.0 Likely
CVE-2021-23228 2021-12-22 2024-11-21 7.5 4.3 Likely
CVE-2021-31558 2021-12-22 2024-11-21 6.5 4.3 Likely
CVE-2021-44471 2021-12-22 2024-11-21 7.5 4.3 Likely
CVE-2021-44544 2021-12-22 2024-11-21 7.5 4.3 Likely
CVE-2022-0988 2022-03-25 2024-11-21 7.1 5.0 Likely
CVE-2022-0923 2022-03-29 2024-11-21 9.8 7.5 Likely
CVE-2022-25347 2022-03-29 2024-11-21 9.8 5.0 Likely
CVE-2022-25880 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-25980 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26013 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26059 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26065 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26069 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26338 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26349 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26514 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26666 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26667 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26836 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-26839 2022-03-29 2024-11-21 7.8 4.6 Unknown
CVE-2022-26887 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-27175 2022-03-29 2024-11-21 9.8 10.0 Likely
CVE-2022-1098 2022-04-01 2024-11-21 7.8 4.4 Unknown
CVE-2022-1366 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1367 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1369 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1370 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1371 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1372 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1374 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1375 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1376 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1377 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-1378 2022-05-02 2024-11-21 9.8 10.0 Likely
CVE-2022-33005 2022-06-27 2024-11-21 6.1 4.3 Likely
CVE-2022-3214 2022-09-16 2024-11-21 9.8 - -
CVE-2022-43774 2022-10-26 2025-05-07 9.8 - -
CVE-2022-43775 2022-10-26 2025-05-07 9.8 - -
CVE-2022-40965 2022-10-27 2024-11-21 8.7 - -
CVE-2022-40967 2022-10-27 2024-11-21 8.8 - -
CVE-2022-41133 2022-10-27 2024-11-21 8.8 - -
CVE-2022-41555 2022-10-27 2024-11-21 8.7 - -
CVE-2022-41651 2022-10-27 2024-11-21 8.7 - -
CVE-2022-41701 2022-10-27 2024-11-21 8.7 - -
CVE-2022-41702 2022-10-27 2024-11-21 8.7 - -
CVE-2022-41773 2022-10-27 2024-11-21 8.8 - -
CVE-2022-41775 2022-11-17 2024-11-21 8.8 - -
CVE-2022-43447 2022-11-17 2024-11-21 8.8 - -
CVE-2022-43452 2022-11-17 2024-11-21 8.8 - -
CVE-2022-43457 2022-11-17 2024-11-21 8.8 - -
CVE-2022-43506 2022-11-17 2024-11-21 8.8 - -
CVE-2023-0822 2023-02-17 2024-11-21 8.8 - -
CVE-2024-25937 2024-03-21 2025-01-24 8.8 - -
CVE-2024-28029 2024-03-21 2024-11-21 8.8 - -
CVE-2024-28891 2024-03-21 2025-11-05 8.8 - -
CVE-2024-23494 2024-03-21 2025-11-05 8.8 - -
CVE-2024-23975 2024-03-21 2025-11-05 8.8 - -
CVE-2024-25567 2024-03-21 2025-11-05 8.1 - -
CVE-2024-28040 2024-03-21 2025-11-05 8.8 - -
CVE-2024-28045 2024-03-21 2025-11-05 4.6 - -
CVE-2024-28171 2024-03-21 2025-11-05 8.1 - -
CVE-2024-25574 2024-04-01 2025-02-27 8.8 - -
CVE-2024-34031 2024-05-03 2025-01-30 8.8 - -
CVE-2024-34032 2024-05-03 2025-01-30 8.8 - -
CVE-2024-34033 2024-05-03 2025-01-30 8.8 - -
CVE-2024-4547 2024-05-06 2025-06-27 9.8 - -
CVE-2024-4548 2024-05-06 2025-06-27 9.8 - -
CVE-2024-4549 2024-05-06 2025-06-17 7.5 - -
CVE-2024-42417 2024-10-03 2024-10-08 8.8 - -
CVE-2024-43699 2024-10-03 2024-10-08 9.8 - -
CVE-2025-57700 2025-08-18 2025-08-21 6.1 - -
CVE-2025-57701 2025-08-18 2025-08-21 6.1 - -
CVE-2025-57702 2025-08-18 2025-08-21 6.1 - -
CVE-2025-57703 2025-08-18 2025-08-21 6.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for deltaww diaenergie by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.