Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
envoy Vendor: envoyproxy

About This Product

envoy is a software product offered by envoyproxy. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 95 known vulnerabilities affecting envoyproxy envoy. This includes 3 critical-severity issues and 53 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2026, indicating a sustained research interest and ongoing security attention. 37 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-9900 2019-04-25 2024-11-21 8.3 7.5 Likely
CVE-2019-9901 2019-04-25 2024-11-21 6.5 7.5 Likely
CVE-2019-15225 2019-08-19 2024-11-21 7.5 5.0 Likely
CVE-2019-15226 2019-10-09 2024-11-21 7.5 7.8 Likely
CVE-2019-18836 2019-11-11 2024-11-21 7.5 5.0 Likely
CVE-2019-18801 2019-12-13 2024-11-21 9.8 7.5 Likely
CVE-2019-18802 2019-12-13 2024-11-21 9.8 7.5 Likely
CVE-2019-18838 2019-12-13 2024-11-21 7.5 5.0 Likely
CVE-2020-8660 2020-03-04 2024-11-21 5.3 5.0 Likely
CVE-2020-11767 2020-04-15 2024-11-21 3.1 2.6 Unknown
CVE-2020-12603 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-12604 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-12605 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-8663 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-15104 2020-07-14 2024-11-21 4.6 5.5 Likely
CVE-2020-25017 2020-10-01 2024-11-21 8.3 7.5 Likely
CVE-2020-25018 2020-10-01 2024-11-21 7.5 5.0 Likely
CVE-2020-35470 2020-12-15 2024-11-21 8.8 5.8 Unknown
CVE-2020-35471 2020-12-15 2024-11-21 7.5 5.0 Likely
CVE-2021-21378 2021-03-11 2024-11-21 8.2 6.4 Likely
CVE-2021-28682 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-28683 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-29258 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-29492 2021-05-28 2024-11-21 8.1 7.5 Likely
CVE-2021-32777 2021-08-24 2024-11-21 8.6 7.5 Likely
CVE-2021-32778 2021-08-24 2024-11-21 5.8 5.0 Likely
CVE-2021-32779 2021-08-24 2024-11-21 8.6 7.5 Likely
CVE-2021-32780 2021-08-24 2024-11-21 8.6 5.0 Likely
CVE-2021-32781 2021-08-24 2024-11-21 8.6 5.0 Likely
CVE-2021-39162 2021-09-09 2024-11-21 8.6 5.0 Likely
CVE-2021-39204 2021-09-09 2024-11-21 7.5 5.0 Likely
CVE-2021-39206 2021-09-09 2024-11-21 8.6 5.0 Likely
CVE-2021-43824 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2021-43825 2022-02-22 2024-11-21 6.1 5.0 Likely
CVE-2021-43826 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2022-21654 2022-02-22 2024-11-21 7.4 6.8 Likely
CVE-2022-21655 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2022-21656 2022-02-22 2024-11-21 7.4 5.8 Likely
CVE-2022-21657 2022-02-22 2024-11-21 6.8 4.0 Likely
CVE-2022-23606 2022-02-22 2024-11-21 4.4 4.0 Likely
CVE-2022-29224 2022-06-09 2024-11-21 5.9 4.3 Likely
CVE-2022-29225 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2022-29226 2022-06-09 2024-11-21 10.0 6.4 Likely
CVE-2022-29227 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2022-29228 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2023-27487 2023-04-04 2024-11-21 8.2 - -
CVE-2023-27488 2023-04-04 2024-11-21 5.4 - -
CVE-2023-27491 2023-04-04 2024-11-21 5.4 - -
CVE-2023-27492 2023-04-04 2024-11-21 4.8 - -
CVE-2023-27493 2023-04-04 2024-11-21 8.1 - -
CVE-2023-27496 2023-04-04 2024-11-21 6.5 - -
CVE-2023-35945 2023-07-13 2024-11-21 7.5 - -
CVE-2023-35941 2023-07-25 2024-11-21 8.6 - -
CVE-2023-35942 2023-07-25 2024-11-21 6.5 - -
CVE-2023-35943 2023-07-25 2024-11-21 6.3 - -
CVE-2023-35944 2023-07-25 2024-11-21 8.2 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2024-23322 2024-02-09 2024-11-21 7.5 - -
CVE-2024-23323 2024-02-09 2024-11-21 4.3 - -
CVE-2024-23324 2024-02-09 2024-11-21 8.6 - -
CVE-2024-23325 2024-02-09 2024-11-21 7.5 - -
CVE-2024-23327 2024-02-09 2024-11-21 7.5 - -
CVE-2024-27919 2024-04-04 2025-11-04 7.5 - -
CVE-2024-30255 2024-04-04 2025-11-04 5.3 - -
CVE-2024-32475 2024-04-18 2025-09-04 7.5 - -
CVE-2024-23326 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32974 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32975 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32976 2024-06-04 2024-11-21 7.5 - -
CVE-2024-34362 2024-06-04 2024-11-21 5.9 - -
CVE-2024-34363 2024-06-04 2024-11-21 7.5 - -
CVE-2024-34364 2024-06-04 2024-11-21 5.7 - -
CVE-2024-39305 2024-07-01 2025-09-02 6.5 - -
CVE-2024-45806 2024-09-20 2024-10-15 6.5 - -
CVE-2024-45807 2024-09-20 2024-09-25 7.5 - -
CVE-2024-45808 2024-09-20 2024-09-25 6.5 - -
CVE-2024-45809 2024-09-20 2024-09-24 5.3 - -
CVE-2024-45810 2024-09-20 2024-09-24 6.5 - -
CVE-2024-53269 2024-12-18 2025-08-28 4.5 - -
CVE-2024-53270 2024-12-18 2025-09-04 7.5 - -
CVE-2024-53271 2024-12-18 2025-09-04 7.1 - -
CVE-2025-30157 2025-03-21 2025-04-01 6.5 - -
CVE-2025-46821 2025-05-07 2025-09-03 5.3 - -
CVE-2025-54588 2025-09-03 2025-09-08 7.5 - -
CVE-2025-55162 2025-09-03 2025-09-08 6.3 - -
CVE-2025-62409 2025-10-16 2025-10-29 7.5 - -
CVE-2025-62504 2025-10-16 2025-10-29 6.5 - -
CVE-2025-64527 2025-12-03 2025-12-05 6.5 - -
CVE-2025-64763 2025-12-03 2025-12-05 3.7 - -
CVE-2025-66220 2025-12-03 2025-12-05 5.0 - -
CVE-2026-26308 2026-03-10 2026-03-11 7.5 - -
CVE-2026-26309 2026-03-10 2026-03-11 5.3 - -
CVE-2026-26310 2026-03-10 2026-03-11 5.9 - -
CVE-2026-26311 2026-03-10 2026-03-11 5.9 - -
CVE-2026-26330 2026-03-10 2026-03-11 5.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for envoyproxy envoy by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.