Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
cloud_pak_for_security Vendor: ibm

About This Product

cloud_pak_for_security is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 53 known vulnerabilities affecting ibm cloud_pak_for_security. This includes 4 critical-severity issues and 6 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2025, indicating a recent active security attention. 42 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-4624 2020-11-30 2024-11-21 5.3 5.0 Likely
CVE-2020-4625 2020-11-30 2024-11-21 5.3 5.0 Likely
CVE-2020-4626 2020-11-30 2024-11-21 4.3 4.0 Likely
CVE-2020-4627 2020-11-30 2024-11-21 9.0 9.0 Likely
CVE-2020-4696 2020-11-30 2024-11-21 4.3 4.0 Likely
CVE-2020-4628 2021-01-27 2024-11-21 5.3 5.0 Likely
CVE-2020-4815 2021-01-27 2024-11-21 5.3 5.0 Likely
CVE-2020-4816 2021-01-27 2024-11-21 5.9 4.3 Likely
CVE-2020-4820 2021-01-27 2024-11-21 6.1 4.3 Likely
CVE-2020-4967 2021-01-27 2024-11-21 4.3 4.0 Likely
CVE-2021-20538 2021-05-10 2024-11-21 9.1 6.4 Likely
CVE-2021-20577 2021-05-10 2024-11-21 6.1 4.3 Likely
CVE-2020-4811 2021-05-14 2024-11-21 2.4 4.0 Likely
CVE-2021-20564 2021-05-14 2024-11-21 5.9 4.3 Likely
CVE-2021-20565 2021-05-14 2024-11-21 5.3 5.0 Likely
CVE-2021-20539 2021-08-02 2024-11-21 5.3 5.0 Likely
CVE-2021-20540 2021-08-02 2024-11-21 5.3 5.0 Likely
CVE-2021-20541 2021-08-02 2024-11-21 5.3 5.0 Likely
CVE-2021-29696 2021-08-02 2024-11-21 7.2 9.0 Likely
CVE-2021-29697 2021-08-02 2024-11-21 4.9 4.0 Likely
CVE-2021-20578 2021-09-30 2024-11-21 9.8 7.5 Likely
CVE-2021-29894 2021-09-30 2024-11-21 7.5 5.0 Likely
CVE-2021-39013 2021-12-22 2024-11-21 6.5 4.0 Likely
CVE-2022-36776 2022-11-11 2024-11-21 5.4 - -
CVE-2022-38387 2022-11-11 2024-11-21 7.1 - -
CVE-2022-38385 2022-11-15 2024-11-21 7.1 - -
CVE-2021-39011 2023-01-20 2024-11-21 4.2 - -
CVE-2021-39089 2023-01-20 2024-11-21 4.3 - -
CVE-2023-30993 2023-06-27 2024-11-21 6.8 - -
CVE-2022-36777 2023-11-22 2024-11-21 4.3 - -
CVE-2023-50951 2024-02-17 2024-12-03 4.0 - -
CVE-2024-22335 2024-02-17 2024-12-04 5.1 - -
CVE-2024-22336 2024-02-17 2024-12-04 5.1 - -
CVE-2024-22337 2024-02-17 2024-12-03 5.1 - -
CVE-2021-39090 2024-02-29 2024-12-31 5.9 - -
CVE-2023-47742 2024-03-03 2024-12-23 5.9 - -
CVE-2024-22355 2024-03-03 2024-12-23 5.9 - -
CVE-2024-28782 2024-04-03 2025-08-14 6.3 - -
CVE-2023-47731 2024-04-23 2025-08-13 5.4 - -
CVE-2022-38386 2024-05-01 2025-08-13 5.9 - -
CVE-2023-47727 2024-05-02 2025-08-13 4.3 - -
CVE-2023-47726 2024-06-18 2025-08-08 7.1 - -
CVE-2022-38383 2024-06-28 2024-11-21 4.0 - -
CVE-2024-25023 2024-07-10 2024-11-21 5.5 - -
CVE-2022-38382 2024-08-13 2024-09-21 4.7 - -
CVE-2024-28799 2024-08-14 2024-09-21 5.6 - -
CVE-2024-25024 2024-08-15 2025-03-13 5.5 - -
CVE-2023-47728 2024-08-16 2024-09-21 6.5 - -
CVE-2025-1334 2025-06-03 2025-08-12 4.0 - -
CVE-2025-25019 2025-06-03 2025-08-12 4.8 - -
CVE-2025-25020 2025-06-03 2025-08-12 6.5 - -
CVE-2025-25021 2025-06-03 2025-08-12 7.2 - -
CVE-2025-25022 2025-06-03 2025-08-12 9.6 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm cloud_pak_for_security by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.