Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
yocto Vendor: linuxfoundation

About This Product

yocto is a software product offered by linuxfoundation. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 114 known vulnerabilities affecting linuxfoundation yocto. This includes 2 critical-severity issues and 17 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2026, indicating a recent active security attention. 93 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-26475 2022-10-07 2024-11-21 6.7 - -
CVE-2022-32589 2022-10-07 2024-11-21 7.5 - -
CVE-2022-32590 2022-10-07 2024-11-21 6.7 - -
CVE-2022-32592 2022-10-07 2024-11-21 6.7 - -
CVE-2023-20726 2023-05-15 2025-01-24 3.3 - -
CVE-2023-20727 2023-06-06 2025-01-08 4.4 - -
CVE-2023-20712 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20715 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20716 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20728 2023-06-06 2025-01-07 4.4 - -
CVE-2023-20729 2023-06-06 2025-01-08 4.4 - -
CVE-2023-20730 2023-06-06 2025-01-08 4.4 - -
CVE-2023-20731 2023-06-06 2025-01-08 4.4 - -
CVE-2023-20732 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20733 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20734 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20735 2023-06-06 2025-01-08 6.7 - -
CVE-2023-20736 2023-06-06 2025-01-07 6.4 - -
CVE-2023-20737 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20738 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20740 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20743 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20744 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20745 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20746 2023-06-06 2025-01-07 6.7 - -
CVE-2023-20747 2023-06-06 2025-01-07 4.4 - -
CVE-2022-32666 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20689 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20690 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20691 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20692 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20693 2023-07-04 2024-11-21 7.5 - -
CVE-2023-20790 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20796 2023-08-07 2024-11-21 4.4 - -
CVE-2023-20800 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20801 2023-08-07 2024-11-21 6.4 - -
CVE-2023-20802 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20803 2023-08-07 2024-11-21 6.5 - -
CVE-2023-20804 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20805 2023-08-07 2024-11-21 6.7 - -
CVE-2023-20821 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20828 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20829 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20830 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20831 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20832 2023-09-04 2024-11-21 6.7 - -
CVE-2023-20835 2023-09-04 2024-11-21 6.4 - -
CVE-2023-20838 2023-09-04 2024-11-21 4.0 - -
CVE-2023-20839 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20840 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20841 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20842 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20843 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20844 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20845 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20846 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20847 2023-09-04 2024-11-21 4.2 - -
CVE-2023-20848 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20849 2023-09-04 2024-11-21 6.5 - -
CVE-2023-20850 2023-09-04 2024-11-21 6.5 - -
CVE-2023-32806 2023-09-04 2024-11-21 6.7 - -
CVE-2023-32807 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32810 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32811 2023-09-04 2024-11-21 6.7 - -
CVE-2023-32812 2023-09-04 2024-11-21 6.7 - -
CVE-2023-32813 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32815 2023-09-04 2024-11-21 4.4 - -
CVE-2023-32820 2023-10-02 2024-11-21 7.5 - -
CVE-2023-32829 2023-10-02 2024-11-21 6.7 - -
CVE-2023-32855 2023-12-04 2024-11-21 6.7 - -
CVE-2024-25626 2024-02-19 2025-02-03 8.8 - -
CVE-2024-20022 2024-03-04 2025-03-13 6.7 - -
CVE-2024-20023 2024-03-04 2025-04-22 6.7 - -
CVE-2024-20040 2024-04-01 2025-04-23 8.8 - -
CVE-2024-20049 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20050 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20051 2024-04-01 2025-04-23 2.3 - -
CVE-2024-20052 2024-04-01 2025-04-23 4.4 - -
CVE-2024-20053 2024-04-01 2025-04-23 8.4 - -
CVE-2024-20054 2024-04-01 2025-04-23 6.6 - -
CVE-2024-20055 2024-04-01 2025-04-23 6.3 - -
CVE-2023-32871 2024-05-06 2025-05-05 5.3 - -
CVE-2024-20080 2024-07-01 2025-05-28 9.8 - -
CVE-2024-20081 2024-07-01 2025-03-13 6.7 - -
CVE-2024-20084 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20085 2024-09-02 2024-10-27 4.4 - -
CVE-2024-20089 2024-09-02 2024-09-05 7.5 - -
CVE-2024-20098 2024-10-07 2025-04-25 6.7 - -
CVE-2024-20099 2024-10-07 2025-04-25 6.7 - -
CVE-2024-20104 2024-11-04 2025-04-24 8.4 - -
CVE-2024-20107 2024-11-04 2025-04-24 6.2 - -
CVE-2024-20139 2024-12-02 2026-01-12 6.5 - -
CVE-2024-20140 2025-01-06 2025-04-22 6.7 - -
CVE-2024-20143 2025-01-06 2025-04-22 6.6 - -
CVE-2024-20144 2025-01-06 2025-04-22 6.6 - -
CVE-2024-20145 2025-01-06 2025-04-22 6.6 - -
CVE-2024-20146 2025-01-06 2025-04-22 8.1 - -
CVE-2024-20148 2025-01-06 2025-04-22 9.8 - -
CVE-2024-20152 2025-01-06 2025-04-21 4.4 - -
CVE-2024-20153 2025-01-06 2026-01-12 7.5 - -
CVE-2024-20147 2025-02-03 2025-04-22 5.3 - -
CVE-2025-20635 2025-02-03 2025-03-13 6.6 - -
CVE-2025-20650 2025-03-03 2025-04-22 6.8 - -
CVE-2025-20651 2025-03-03 2025-04-22 4.1 - -
CVE-2025-20656 2025-04-07 2025-04-09 6.8 - -
CVE-2025-20693 2025-07-08 2025-07-09 6.5 - -
CVE-2025-20696 2025-08-04 2025-08-18 6.8 - -
CVE-2025-20705 2025-09-01 2025-09-03 7.8 - -
CVE-2025-20730 2025-11-04 2025-11-05 6.7 - -
CVE-2025-20746 2025-11-04 2025-11-05 6.7 - -
CVE-2025-20747 2025-11-04 2025-11-05 6.7 - -
CVE-2025-20765 2025-12-02 2026-01-12 4.7 - -
CVE-2026-20435 2026-03-02 2026-03-03 4.6 - -
CVE-2025-61611 2026-03-09 2026-03-09 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for linuxfoundation yocto by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.