Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
cloud_foundation Vendor: vmware

About This Product

cloud_foundation is a software product developed by vmware, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 133 known vulnerabilities affecting vmware cloud_foundation. This includes 18 critical-severity issues and 65 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2026, indicating a sustained research interest and ongoing security attention. 47 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-16919 2019-10-18 2024-11-21 7.5 5.0 Likely
CVE-2020-3969 2020-06-24 2024-11-21 7.8 4.4 Unknown
CVE-2020-3962 2020-06-24 2024-11-21 8.2 4.4 Unknown
CVE-2020-3963 2020-06-25 2024-11-21 5.5 2.1 Unknown
CVE-2020-3964 2020-06-25 2024-11-21 4.7 1.9 Unknown
CVE-2020-3965 2020-06-25 2024-11-21 5.5 2.1 Unknown
CVE-2020-3966 2020-06-25 2024-11-21 7.5 3.7 Unknown
CVE-2020-3967 2020-06-25 2024-11-21 7.5 4.4 Unknown
CVE-2020-3968 2020-06-25 2024-11-21 8.2 4.6 Unknown
CVE-2020-3970 2020-06-25 2024-11-21 3.8 1.9 Unknown
CVE-2020-3971 2020-06-25 2024-11-21 5.5 2.1 Unknown
CVE-2020-3976 2020-08-21 2024-11-21 5.3 5.0 Likely
CVE-2020-3981 2020-10-20 2024-11-21 5.8 3.5 Unknown
CVE-2020-3982 2020-10-20 2024-11-21 7.7 4.9 Unknown
CVE-2020-3992 2020-10-20 2025-10-30 9.8 10.0 Likely
CVE-2020-3993 2020-10-20 2025-08-13 5.9 4.3 Likely
CVE-2020-3994 2020-10-20 2024-11-21 7.4 5.8 Likely
CVE-2020-3995 2020-10-20 2024-11-21 5.3 3.5 Unknown
CVE-2020-4004 2020-11-20 2025-10-31 8.2 4.6 Unknown
CVE-2020-4005 2020-11-20 2025-10-31 7.8 7.2 Unknown
CVE-2020-4006 2020-11-23 2025-10-30 9.1 9.0 Likely
CVE-2021-21972 2021-02-24 2025-10-30 9.8 10.0 Likely
CVE-2021-21973 2021-02-24 2025-10-30 5.3 5.0 Likely
CVE-2021-21974 2021-02-24 2024-11-21 8.8 5.8 Unknown
CVE-2021-21975 2021-03-31 2025-10-30 7.5 5.0 Likely
CVE-2021-21983 2021-03-31 2024-11-21 6.5 8.5 Likely
CVE-2021-21985 2021-05-26 2025-10-30 9.8 10.0 Likely
CVE-2021-21986 2021-05-26 2024-11-21 9.8 10.0 Likely
CVE-2021-21994 2021-07-13 2025-10-31 9.8 6.8 Likely
CVE-2021-21995 2021-07-13 2025-10-31 7.5 5.0 Likely
CVE-2021-22022 2021-08-30 2024-11-21 4.9 4.0 Likely
CVE-2021-22023 2021-08-30 2024-11-21 7.2 6.5 Likely
CVE-2021-22024 2021-08-30 2024-11-21 7.5 5.0 Likely
CVE-2021-22025 2021-08-30 2024-11-21 7.5 5.0 Likely
CVE-2021-22026 2021-08-30 2024-11-21 7.5 5.0 Likely
CVE-2021-22027 2021-08-30 2024-11-21 7.5 5.0 Likely
CVE-2021-22021 2021-08-30 2024-11-21 5.4 3.5 Unknown
CVE-2021-22002 2021-08-31 2024-11-21 9.8 7.5 Likely
CVE-2021-22003 2021-08-31 2024-11-21 7.5 5.0 Likely
CVE-2021-21991 2021-09-22 2024-11-21 7.8 4.6 Unknown
CVE-2021-21992 2021-09-22 2024-11-21 6.5 6.8 Likely
CVE-2021-21993 2021-09-23 2024-11-21 6.5 4.0 Likely
CVE-2021-22005 2021-09-23 2025-10-30 9.8 7.5 Likely
CVE-2021-22006 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22007 2021-09-23 2024-11-21 5.5 2.1 Unknown
CVE-2021-22008 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22009 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22010 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22011 2021-09-23 2024-11-21 5.3 5.0 Likely
CVE-2021-22012 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22013 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22014 2021-09-23 2024-11-21 7.2 9.0 Likely
CVE-2021-22015 2021-09-23 2024-11-21 7.8 7.2 Unknown
CVE-2021-22016 2021-09-23 2024-11-21 6.1 4.3 Likely
CVE-2021-22018 2021-09-23 2024-11-21 6.5 6.4 Likely
CVE-2021-22019 2021-09-23 2024-11-21 7.5 5.0 Likely
CVE-2021-22020 2021-09-23 2024-11-21 5.5 2.1 Unknown
CVE-2021-22033 2021-10-13 2024-11-21 2.7 4.0 Likely
CVE-2021-22035 2021-10-13 2024-11-21 4.3 4.0 Likely
CVE-2021-22048 2021-11-10 2025-10-31 8.8 6.5 Likely
CVE-2021-21980 2021-11-24 2024-11-21 7.5 5.0 Likely
CVE-2021-22045 2022-01-04 2024-11-21 7.8 6.9 Unknown
CVE-2022-22939 2022-02-04 2025-10-31 4.9 4.0 Likely
CVE-2021-22040 2022-02-16 2024-11-21 6.7 4.6 Unknown
CVE-2021-22041 2022-02-16 2024-11-21 6.7 4.6 Unknown
CVE-2021-22042 2022-02-16 2024-11-21 7.8 4.6 Unknown
CVE-2021-22050 2022-02-16 2024-11-21 7.5 5.0 Likely
CVE-2022-22945 2022-02-16 2024-11-21 7.8 7.2 Unknown
CVE-2022-22948 2022-03-29 2025-10-31 6.5 4.0 Likely
CVE-2022-22954 2022-04-11 2025-10-30 9.8 10.0 Likely
CVE-2022-22957 2022-04-13 2024-11-21 7.2 6.5 Likely
CVE-2022-22958 2022-04-13 2024-11-21 7.2 6.5 Likely
CVE-2022-22959 2022-04-13 2024-11-21 4.3 4.3 Likely
CVE-2022-22960 2022-04-13 2025-10-30 7.8 7.2 Unknown
CVE-2022-22961 2022-04-13 2024-11-21 5.3 5.0 Likely
CVE-2022-22972 2022-05-20 2024-11-21 9.8 7.5 Likely
CVE-2022-22973 2022-05-20 2024-11-21 7.8 7.2 Unknown
CVE-2022-22982 2022-07-13 2024-11-21 7.5 - -
CVE-2022-31681 2022-10-07 2024-11-21 6.5 - -
CVE-2022-31678 2022-10-28 2025-05-08 9.1 - -
CVE-2022-31696 2022-12-13 2025-04-22 8.8 - -
CVE-2022-31697 2022-12-13 2025-04-22 5.5 - -
CVE-2022-31698 2022-12-13 2025-10-31 5.3 - -
CVE-2022-31699 2022-12-13 2025-04-22 3.3 - -
CVE-2022-31700 2022-12-14 2025-04-22 7.2 - -
CVE-2022-31701 2022-12-14 2025-04-22 5.3 - -
CVE-2023-20864 2023-04-20 2025-02-05 9.8 - -
CVE-2023-20865 2023-04-20 2025-02-05 7.2 - -
CVE-2023-20877 2023-05-12 2025-01-27 8.8 - -
CVE-2023-20878 2023-05-12 2025-01-27 7.2 - -
CVE-2023-20879 2023-05-12 2025-01-27 6.7 - -
CVE-2023-20880 2023-05-12 2025-01-27 6.7 - -
CVE-2023-20884 2023-05-30 2025-01-10 6.1 - -
CVE-2023-34043 2023-09-27 2024-11-21 6.7 - -
CVE-2023-34063 2024-01-16 2025-06-20 9.9 - -
CVE-2024-22235 2024-02-21 2025-03-20 6.7 - -
CVE-2024-22253 2024-03-05 2025-05-07 9.3 - -
CVE-2024-22254 2024-03-05 2025-05-07 7.9 - -
CVE-2024-22255 2024-03-05 2025-05-07 7.1 - -
CVE-2024-22273 2024-05-21 2025-03-26 8.1 - -
CVE-2024-22274 2024-05-21 2025-06-27 7.2 - -
CVE-2024-22275 2024-05-21 2025-06-27 4.9 - -
CVE-2024-37079 2024-06-18 2026-01-26 9.8 - -
CVE-2024-37080 2024-06-18 2025-03-13 9.8 - -
CVE-2024-37081 2024-06-18 2025-06-20 7.8 - -
CVE-2024-37085 2024-06-25 2025-10-30 6.8 - -
CVE-2024-37086 2024-06-25 2025-06-27 6.8 - -
CVE-2024-37087 2024-06-25 2025-06-27 5.3 - -
CVE-2024-22280 2024-07-11 2025-03-14 8.5 - -
CVE-2024-38812 2024-09-17 2025-10-31 9.8 - -
CVE-2024-38813 2024-09-17 2025-10-31 7.5 - -
CVE-2024-38830 2024-11-26 2025-05-14 7.8 - -
CVE-2024-38831 2024-11-26 2025-05-14 7.8 - -
CVE-2024-38832 2024-11-26 2025-05-14 7.1 - -
CVE-2024-38833 2024-11-26 2025-05-14 6.8 - -
CVE-2024-38834 2024-11-26 2025-05-14 6.5 - -
CVE-2025-22218 2025-01-30 2025-05-14 8.5 - -
CVE-2025-22219 2025-01-30 2025-05-14 6.8 - -
CVE-2025-22220 2025-01-30 2025-05-14 4.3 - -
CVE-2025-22221 2025-01-30 2025-05-14 5.2 - -
CVE-2025-22222 2025-01-30 2025-05-14 7.7 - -
CVE-2025-22224 2025-03-04 2025-10-30 9.3 - -
CVE-2025-22225 2025-03-04 2025-10-30 8.2 - -
CVE-2025-22226 2025-03-04 2025-10-30 7.1 - -
CVE-2025-22249 2025-05-13 2025-07-11 8.2 - -
CVE-2025-41231 2025-05-20 2025-06-12 7.3 - -
CVE-2025-22243 2025-06-04 2025-07-14 7.5 - -
CVE-2025-22244 2025-06-04 2025-07-14 6.9 - -
CVE-2025-22245 2025-06-04 2025-07-14 5.9 - -
CVE-2025-41244 2025-09-29 2025-11-06 7.8 - -
CVE-2026-22719 2026-02-25 2026-03-04 8.1 - -
CVE-2026-22720 2026-02-25 2026-03-04 8.0 - -
CVE-2026-22721 2026-02-25 2026-03-04 6.2 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for vmware cloud_foundation by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.