Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
i Vendor: ibm

About This Product

i is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 113 known vulnerabilities affecting ibm i. This includes 3 critical-severity issues and 41 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2013 to 2025, indicating a sustained research interest and ongoing security attention. 63 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-4002 2013-07-23 2025-04-11 - 7.1 Likely
CVE-2013-5385 2014-01-02 2025-04-11 - 8.5 Likely
CVE-2017-1460 2017-07-31 2025-04-20 7.5 5.0 Likely
CVE-2019-4040 2019-01-31 2024-11-21 6.1 4.3 Likely
CVE-2019-4381 2019-06-14 2024-11-21 5.5 2.1 Unknown
CVE-2019-4377 2019-06-25 2024-11-21 4.3 4.0 Likely
CVE-2019-4536 2019-08-29 2024-11-21 6.3 3.3 Unknown
CVE-2019-4450 2019-11-09 2024-11-21 6.1 4.3 Likely
CVE-2020-4259 2020-05-14 2024-11-21 6.5 4.0 Likely
CVE-2020-4299 2020-05-14 2024-11-21 4.3 4.0 Likely
CVE-2020-4365 2020-05-14 2024-11-21 4.3 4.0 Likely
CVE-2020-4345 2020-05-17 2024-11-21 3.3 1.9 Unknown
CVE-2020-9411 2020-06-09 2024-11-21 10.0 9.3 Likely
CVE-2020-9412 2020-06-09 2024-11-21 10.0 10.0 Likely
CVE-2020-4578 2020-09-10 2024-11-21 5.4 3.5 Unknown
CVE-2020-4629 2020-09-30 2024-11-21 3.3 2.1 Unknown
CVE-2020-4937 2020-11-20 2024-11-21 7.5 5.0 Likely
CVE-2019-4738 2020-12-10 2024-11-21 6.5 4.0 Likely
CVE-2020-4657 2020-12-16 2024-11-21 6.1 4.3 Likely
CVE-2020-4658 2020-12-16 2024-11-21 6.1 4.3 Likely
CVE-2020-4870 2020-12-21 2024-11-21 7.5 5.0 Likely
CVE-2019-4728 2021-01-05 2024-11-21 8.8 9.0 Likely
CVE-2020-4761 2021-01-05 2024-11-21 5.3 5.0 Likely
CVE-2020-4762 2021-01-05 2024-11-21 8.8 6.5 Likely
CVE-2020-4949 2021-01-26 2024-11-21 8.2 6.4 Likely
CVE-2021-20354 2021-02-18 2024-11-21 7.5 7.8 Likely
CVE-2021-20480 2021-04-08 2024-11-21 6.5 4.0 Likely
CVE-2021-20501 2021-04-21 2024-11-21 8.2 6.4 Likely
CVE-2021-29754 2021-06-11 2024-11-21 8.8 6.5 Likely
CVE-2021-20562 2021-07-27 2024-11-21 5.4 3.5 Unknown
CVE-2021-29736 2021-07-30 2024-11-21 8.8 6.5 Likely
CVE-2021-38949 2021-11-16 2024-11-21 5.5 2.1 Unknown
CVE-2021-38951 2021-12-09 2024-11-21 7.5 5.0 Likely
CVE-2021-38876 2021-12-30 2024-11-21 6.1 4.3 Likely
CVE-2021-39056 2022-01-13 2024-11-21 6.5 4.0 Likely
CVE-2022-22310 2022-01-19 2024-11-21 6.5 6.4 Likely
CVE-2022-22481 2022-05-09 2024-11-21 5.3 5.0 Likely
CVE-2022-22495 2022-05-24 2024-11-21 8.8 6.5 Likely
CVE-2022-34358 2022-07-13 2024-11-21 5.4 - -
CVE-2022-22473 2022-07-14 2024-11-21 5.3 - -
CVE-2022-22477 2022-07-14 2024-11-21 6.1 - -
CVE-2022-34165 2022-09-09 2024-11-21 5.4 - -
CVE-2022-34336 2022-09-13 2024-11-21 5.4 - -
CVE-2022-22423 2022-09-23 2025-05-22 5.5 - -
CVE-2022-38712 2022-11-03 2025-05-02 5.9 - -
CVE-2022-31772 2022-11-11 2024-11-21 5.3 - -
CVE-2022-40750 2022-11-11 2024-11-21 5.4 - -
CVE-2022-43857 2022-12-22 2024-11-21 4.3 - -
CVE-2022-43858 2022-12-22 2024-11-21 4.3 - -
CVE-2022-43859 2022-12-22 2024-11-21 6.3 - -
CVE-2022-43860 2022-12-24 2024-11-21 4.3 - -
CVE-2022-43917 2023-01-26 2024-11-21 5.9 - -
CVE-2023-23477 2023-02-03 2024-11-21 8.1 - -
CVE-2022-42436 2023-02-12 2024-11-21 4.0 - -
CVE-2023-26283 2023-04-02 2024-11-21 5.4 - -
CVE-2023-23470 2023-05-04 2025-01-29 6.4 - -
CVE-2023-28514 2023-05-19 2024-11-21 6.2 - -
CVE-2023-28950 2023-05-19 2024-11-21 5.1 - -
CVE-2023-30990 2023-07-04 2024-11-21 8.6 - -
CVE-2023-30988 2023-07-16 2024-11-21 8.4 - -
CVE-2023-30989 2023-07-16 2024-11-21 8.4 - -
CVE-2023-28513 2023-07-19 2024-11-21 5.9 - -
CVE-2023-38721 2023-08-14 2024-11-21 8.4 - -
CVE-2023-40375 2023-09-28 2024-11-21 7.4 - -
CVE-2023-40378 2023-10-15 2024-11-21 4.9 - -
CVE-2023-40377 2023-10-16 2024-11-21 4.9 - -
CVE-2023-40686 2023-10-29 2024-11-21 4.9 - -
CVE-2023-40685 2023-10-29 2024-11-21 7.4 - -
CVE-2023-42006 2023-12-01 2024-11-21 8.4 - -
CVE-2023-47741 2023-12-18 2024-11-21 5.3 - -
CVE-2023-43064 2023-12-25 2024-11-21 7.0 - -
CVE-2024-22346 2024-03-14 2024-11-21 8.4 - -
CVE-2023-45177 2024-03-20 2025-07-03 5.3 - -
CVE-2023-33855 2024-03-26 2025-07-25 3.7 - -
CVE-2023-47150 2024-03-26 2025-07-25 7.5 - -
CVE-2024-25050 2024-04-28 2025-08-13 8.4 - -
CVE-2024-31879 2024-05-18 2025-07-03 7.5 - -
CVE-2024-27264 2024-05-22 2025-06-30 7.4 - -
CVE-2024-31878 2024-06-07 2024-11-21 5.3 - -
CVE-2024-27275 2024-06-15 2025-09-29 7.4 - -
CVE-2024-31870 2024-06-15 2024-11-21 3.3 - -
CVE-2024-31890 2024-06-21 2025-07-17 7.8 - -
CVE-2024-38330 2024-07-08 2024-11-21 7.0 - -
CVE-2024-45071 2024-10-16 2024-10-21 5.5 - -
CVE-2024-45072 2024-10-16 2024-10-21 5.5 - -
CVE-2024-47104 2024-12-18 2025-07-03 6.8 - -
CVE-2024-51463 2024-12-21 2025-11-03 5.4 - -
CVE-2024-51464 2024-12-21 2025-11-03 4.3 - -
CVE-2024-55896 2025-01-03 2025-08-19 5.4 - -
CVE-2024-55897 2025-01-03 2025-06-20 4.3 - -
CVE-2024-35122 2025-01-24 2025-09-29 2.8 - -
CVE-2024-52895 2025-02-14 2025-07-03 6.5 - -
CVE-2024-55898 2025-02-24 2025-07-03 8.5 - -
CVE-2024-22340 2025-03-11 2025-07-25 6.5 - -
CVE-2024-41760 2025-03-11 2025-07-25 3.7 - -
CVE-2024-49823 2025-03-11 2025-07-25 6.5 - -
CVE-2025-2947 2025-04-17 2025-07-17 7.2 - -
CVE-2025-2950 2025-04-18 2025-07-03 5.4 - -
CVE-2025-27907 2025-04-22 2025-07-18 4.1 - -
CVE-2025-3218 2025-05-07 2025-07-03 5.4 - -
CVE-2025-33104 2025-05-14 2025-07-18 4.4 - -
CVE-2025-33103 2025-05-17 2025-06-04 8.5 - -
CVE-2025-33108 2025-06-14 2025-08-20 8.5 - -
CVE-2025-33122 2025-06-17 2025-07-03 7.5 - -
CVE-2025-36004 2025-06-25 2025-07-03 8.8 - -
CVE-2025-36038 2025-06-25 2025-07-18 9.0 - -
CVE-2025-33109 2025-07-24 2025-08-11 7.5 - -
CVE-2025-36119 2025-08-08 2025-08-15 7.1 - -
CVE-2025-33142 2025-08-14 2025-08-18 5.3 - -
CVE-2025-36047 2025-08-14 2025-11-03 5.3 - -
CVE-2025-36128 2025-10-16 2025-10-28 7.5 - -
CVE-2025-36367 2025-11-01 2025-11-05 8.8 - -
CVE-2025-36371 2025-11-19 2025-11-24 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm i by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.