Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ami

About This Vendor

ami is a technology vendor producing software and infrastructure products. As a software provider, ami's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ami's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 62 known vulnerabilities from ami. This includes 5 critical-severity issues and 43 high-severity issues that represent significant risk. These vulnerabilities affect 29 distinct products across ami's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2022 through 2025, with recent active disclosure activity. Organizations deploying ami products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-26873 2022-09-20 2025-05-27 8.2 - -
CVE-2022-40250 2022-09-20 2025-05-28 8.8 - -
CVE-2022-40261 2022-09-20 2025-05-28 8.2 - -
CVE-2022-40262 2022-09-20 2025-05-27 8.2 - -
CVE-2022-2827 2022-12-05 2024-11-21 7.5 - -
CVE-2022-40242 2022-12-05 2024-11-21 7.5 - -
CVE-2022-40259 2022-12-05 2024-11-21 8.3 - -
CVE-2022-26872 2023-01-30 2024-11-21 8.3 - -
CVE-2022-40258 2023-01-31 2025-02-13 5.3 - -
CVE-2023-25191 2023-02-15 2025-03-19 7.5 - -
CVE-2023-25192 2023-02-15 2025-03-19 5.3 - -
CVE-2023-28863 2023-04-18 2024-11-21 9.1 - -
CVE-2023-34341 2023-06-12 2024-11-21 7.2 - -
CVE-2023-34344 2023-06-12 2024-11-21 5.3 - -
CVE-2023-34345 2023-06-12 2024-11-21 6.5 - -
CVE-2023-34334 2023-06-12 2024-11-21 7.2 - -
CVE-2023-34335 2023-06-12 2024-11-21 7.7 - -
CVE-2023-34336 2023-06-12 2024-11-21 8.1 - -
CVE-2023-34342 2023-06-12 2024-11-21 6.0 - -
CVE-2023-34343 2023-06-12 2024-11-21 7.2 - -
CVE-2023-34337 2023-07-05 2024-11-21 7.6 - -
CVE-2023-34338 2023-07-05 2024-11-21 7.1 - -
CVE-2023-34471 2023-07-05 2024-11-21 6.3 - -
CVE-2023-34472 2023-07-05 2024-11-21 5.7 - -
CVE-2023-34473 2023-07-05 2024-11-21 6.6 - -
CVE-2023-34329 2023-07-18 2025-02-13 9.1 - -
CVE-2023-34330 2023-07-18 2025-02-13 8.2 - -
CVE-2023-34469 2023-09-12 2024-11-21 4.9 - -
CVE-2023-34470 2023-09-12 2024-11-21 6.8 - -
CVE-2023-39535 2023-11-14 2024-11-21 7.5 - -
CVE-2023-39536 2023-11-14 2024-11-21 7.5 - -
CVE-2023-39537 2023-11-14 2024-11-21 7.5 - -
CVE-2023-39538 2023-12-06 2024-11-21 7.5 - -
CVE-2023-39539 2023-12-06 2024-11-21 7.5 - -
CVE-2023-34332 2024-01-09 2024-11-21 7.8 - -
CVE-2023-34333 2024-01-09 2024-11-21 7.8 - -
CVE-2023-37293 2024-01-09 2024-11-21 9.6 - -
CVE-2023-37294 2024-01-09 2024-11-21 8.3 - -
CVE-2023-37295 2024-01-09 2024-11-21 8.3 - -
CVE-2023-37296 2024-01-09 2024-11-21 8.3 - -
CVE-2023-37297 2024-01-09 2024-11-21 8.3 - -
CVE-2023-3043 2024-01-09 2024-11-21 9.6 - -
CVE-2024-33656 2024-08-21 2026-01-12 7.8 - -
CVE-2024-33657 2024-08-21 2026-01-12 7.8 - -
CVE-2024-2315 2024-11-12 2025-10-02 7.1 - -
CVE-2024-33658 2024-11-12 2025-10-02 7.8 - -
CVE-2024-33660 2024-11-12 2025-10-02 4.3 - -
CVE-2024-42442 2024-11-12 2025-10-02 7.2 - -
CVE-2024-42444 2025-01-14 2025-10-02 7.5 - -
CVE-2024-33659 2025-02-11 2025-10-02 8.8 - -
CVE-2024-54084 2025-03-11 2025-10-02 7.5 - -
CVE-2024-54085 2025-03-11 2025-11-05 9.8 - -
CVE-2024-42446 2025-05-13 2025-10-02 7.5 - -
CVE-2025-33043 2025-05-29 2025-11-03 5.8 - -
CVE-2025-22830 2025-08-12 2025-10-02 6.7 - -
CVE-2025-22834 2025-08-12 2025-10-02 4.2 - -
CVE-2025-33045 2025-09-09 2025-10-02 8.2 - -
CVE-2025-22831 2025-10-14 2025-10-22 7.8 - -
CVE-2025-22832 2025-10-14 2025-10-22 7.8 - -
CVE-2025-22833 2025-10-14 2025-10-22 7.3 - -
CVE-2025-33044 2025-10-14 2025-10-22 7.8 - -
CVE-2025-58770 2025-12-12 2026-01-12 8.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ami by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ami's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.