Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
zephyr Vendor: zephyrproject

About This Product

zephyr is a software product offered by zephyrproject. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 116 known vulnerabilities affecting zephyrproject zephyr. This includes 14 critical-severity issues and 54 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 45 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-1000800 2018-09-06 2024-11-21 9.8 7.5 Likely
CVE-2017-14199 2019-04-12 2024-11-21 9.8 7.5 Likely
CVE-2017-14201 2019-08-29 2024-11-21 7.8 4.6 Unknown
CVE-2017-14202 2019-08-29 2024-11-21 7.8 4.6 Unknown
CVE-2020-10019 2020-05-11 2024-11-21 8.1 4.6 Unknown
CVE-2020-10021 2020-05-11 2024-11-21 8.1 4.6 Unknown
CVE-2020-10022 2020-05-11 2024-11-21 9.0 7.5 Likely
CVE-2020-10023 2020-05-11 2024-11-21 6.9 4.6 Unknown
CVE-2020-10024 2020-05-11 2024-11-21 7.8 7.2 Unknown
CVE-2020-10027 2020-05-11 2024-11-21 7.8 7.2 Unknown
CVE-2020-10028 2020-05-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-10058 2020-05-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-10059 2020-05-11 2024-11-21 4.8 5.8 Likely
CVE-2020-10060 2020-05-11 2024-11-21 8.0 5.5 Likely
CVE-2020-10067 2020-05-11 2024-11-21 7.5 7.2 Unknown
CVE-2020-10061 2020-06-05 2024-11-21 8.1 5.8 Unknown
CVE-2020-10062 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10063 2020-06-05 2024-11-21 6.8 5.0 Likely
CVE-2020-10068 2020-06-05 2024-11-21 5.1 3.3 Unknown
CVE-2020-10070 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10071 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10064 2021-05-25 2024-11-21 8.3 7.5 Likely
CVE-2020-10065 2021-05-25 2024-11-21 3.8 5.8 Unknown
CVE-2020-10066 2021-05-25 2024-11-21 2.5 3.3 Unknown
CVE-2020-10069 2021-05-25 2024-11-21 4.3 3.3 Unknown
CVE-2020-10072 2021-05-25 2024-11-21 5.9 4.6 Unknown
CVE-2020-13598 2021-05-25 2024-11-21 6.3 4.6 Unknown
CVE-2020-13599 2021-05-25 2024-11-21 3.3 2.1 Unknown
CVE-2020-13600 2021-05-25 2024-11-21 7.0 7.2 Unknown
CVE-2020-13601 2021-05-25 2024-11-21 9.0 7.5 Likely
CVE-2020-13602 2021-05-25 2024-11-21 4.0 2.1 Unknown
CVE-2020-13603 2021-05-25 2024-11-21 6.9 4.6 Unknown
CVE-2021-3320 2021-05-25 2024-11-21 5.9 5.0 Likely
CVE-2021-3319 2021-10-05 2024-11-21 6.5 7.5 Likely
CVE-2021-3436 2021-10-05 2024-11-21 4.3 6.4 Likely
CVE-2021-3510 2021-10-05 2024-11-21 7.5 5.0 Likely
CVE-2021-3581 2021-10-05 2024-11-21 7.0 5.8 Unknown
CVE-2021-3625 2021-10-05 2024-11-21 9.6 7.5 Likely
CVE-2021-3321 2021-10-12 2024-11-21 7.5 5.8 Unknown
CVE-2021-3322 2021-10-12 2024-11-21 6.5 3.3 Unknown
CVE-2021-3323 2021-10-12 2024-11-21 8.3 7.5 Likely
CVE-2021-3330 2021-10-12 2024-11-21 7.1 5.8 Unknown
CVE-2021-3454 2021-10-19 2024-11-21 4.3 5.0 Likely
CVE-2021-3455 2021-10-19 2024-11-21 4.3 5.0 Likely
CVE-2021-3835 2022-02-07 2024-11-21 8.2 5.8 Unknown
CVE-2021-3861 2022-02-07 2024-11-21 8.2 7.2 Unknown
CVE-2021-3430 2022-06-28 2024-11-21 6.5 5.0 Likely
CVE-2021-3431 2022-06-28 2024-11-21 4.3 5.0 Likely
CVE-2021-3432 2022-06-28 2024-11-21 4.3 5.0 Likely
CVE-2021-3433 2022-06-28 2024-11-21 4.0 2.1 Unknown
CVE-2021-3434 2022-06-28 2024-11-21 4.9 4.6 Unknown
CVE-2021-3435 2022-06-28 2024-11-21 4.0 2.1 Unknown
CVE-2022-1041 2022-07-26 2024-11-21 8.2 - -
CVE-2022-1042 2022-07-26 2024-11-21 8.2 - -
CVE-2022-1841 2022-08-31 2024-11-21 7.2 - -
CVE-2022-2741 2022-10-31 2024-11-21 8.2 - -
CVE-2022-2993 2022-12-09 2025-04-22 8.6 - -
CVE-2022-0553 2023-01-11 2024-11-21 6.5 - -
CVE-2021-3966 2023-01-11 2024-11-21 9.6 - -
CVE-2023-0397 2023-01-19 2024-11-21 9.6 - -
CVE-2022-3806 2023-01-25 2025-04-03 9.8 - -
CVE-2023-0396 2023-01-25 2025-04-03 6.8 - -
CVE-2021-3329 2023-02-26 2024-11-21 9.6 - -
CVE-2023-0779 2023-05-30 2024-11-21 6.7 - -
CVE-2023-0359 2023-07-10 2024-11-21 5.9 - -
CVE-2023-1901 2023-07-10 2024-11-21 5.9 - -
CVE-2023-1902 2023-07-10 2024-11-21 5.9 - -
CVE-2023-2234 2023-07-10 2024-11-21 6.8 - -
CVE-2023-4265 2023-08-12 2024-11-21 6.4 - -
CVE-2023-4258 2023-09-25 2024-11-21 8.6 - -
CVE-2023-4259 2023-09-26 2024-11-21 7.1 - -
CVE-2023-4260 2023-09-27 2025-02-13 6.3 - -
CVE-2023-4264 2023-09-27 2025-02-13 7.1 - -
CVE-2023-5184 2023-09-27 2025-02-13 7.0 - -
CVE-2023-3725 2023-10-06 2024-11-21 7.6 - -
CVE-2023-5563 2023-10-13 2024-11-21 7.1 - -
CVE-2023-4263 2023-10-13 2024-11-21 7.6 - -
CVE-2023-4257 2023-10-13 2024-11-21 7.6 - -
CVE-2023-5753 2023-10-25 2025-02-13 6.3 - -
CVE-2023-5139 2023-10-26 2024-11-21 4.4 - -
CVE-2023-4424 2023-11-21 2024-11-21 8.3 - -
CVE-2023-5055 2023-11-21 2024-11-21 8.3 - -
CVE-2023-6749 2024-02-18 2025-01-22 8.0 - -
CVE-2023-5779 2024-02-18 2025-01-22 4.4 - -
CVE-2023-6249 2024-02-18 2025-01-23 8.0 - -
CVE-2024-1638 2024-02-19 2025-01-17 8.2 - -
CVE-2023-6881 2024-02-29 2025-01-23 7.3 - -
CVE-2023-7060 2024-03-15 2025-03-27 8.6 - -
CVE-2024-3077 2024-03-29 2025-01-23 6.8 - -
CVE-2024-3332 2024-07-03 2025-02-03 6.5 - -
CVE-2024-4785 2024-08-19 2025-09-17 7.6 - -
CVE-2024-5754 2024-09-13 2025-09-17 8.2 - -
CVE-2024-6258 2024-09-13 2025-09-17 6.8 - -
CVE-2024-5931 2024-09-13 2025-09-17 6.3 - -
CVE-2024-6135 2024-09-13 2024-09-19 7.6 - -
CVE-2024-6137 2024-09-13 2025-09-17 7.6 - -
CVE-2024-6259 2024-09-13 2025-09-17 7.6 - -
CVE-2024-6442 2024-10-04 2024-11-13 6.3 - -
CVE-2024-6443 2024-10-04 2024-11-12 6.3 - -
CVE-2024-6444 2024-10-04 2024-11-13 6.3 - -
CVE-2024-11263 2024-11-15 2025-02-03 9.3 - -
CVE-2024-8798 2024-12-16 2025-09-17 7.5 - -
CVE-2024-10395 2025-02-03 2025-10-29 8.6 - -
CVE-2025-1673 2025-02-25 2025-02-28 8.2 - -
CVE-2025-1674 2025-02-25 2025-02-28 8.2 - -
CVE-2025-1675 2025-02-25 2025-03-03 8.2 - -
CVE-2025-2962 2025-06-24 2025-10-30 7.5 - -
CVE-2025-20696 2025-08-04 2025-08-18 6.8 - -
CVE-2025-10456 2025-09-19 2025-10-29 7.1 - -
CVE-2025-10457 2025-09-19 2025-10-29 4.3 - -
CVE-2025-10458 2025-09-19 2025-10-29 7.6 - -
CVE-2025-7403 2025-09-19 2025-10-29 7.6 - -
CVE-2025-20746 2025-11-04 2025-11-05 6.7 - -
CVE-2025-20747 2025-11-04 2025-11-05 6.7 - -
CVE-2026-20435 2026-03-02 2026-03-03 4.6 - -
CVE-2026-1678 2026-03-05 2026-03-09 9.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for zephyrproject zephyr by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.