Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

blackberry

About This Vendor

blackberry is a technology vendor producing software and infrastructure products. As a software provider, blackberry's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of blackberry's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 88 known vulnerabilities from blackberry. This includes 9 critical-severity issues and 29 high-severity issues that represent significant risk. These vulnerabilities affect 341 distinct products across blackberry's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2002 through 2025, indicating decades of continuous security attention and research. Organizations deploying blackberry products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-0793 2002-08-12 2025-04-03 5.5 4.6 Unknown
CVE-2008-3024 2008-07-07 2025-04-09 - 9.3 Likely
CVE-2008-3246 2008-07-21 2025-04-09 - 9.3 Likely
CVE-2011-0291 2011-12-08 2025-04-11 - 7.2 Unknown
CVE-2013-2687 2013-07-12 2025-04-11 - 7.8 Likely
CVE-2013-2688 2013-07-12 2025-04-11 - 5.4 Unknown
CVE-2013-3692 2013-07-13 2025-04-11 - 6.2 Unknown
CVE-2013-3693 2013-10-11 2025-04-11 - 7.9 Unknown
CVE-2013-6798 2013-11-18 2025-04-11 - 5.8 Likely
CVE-2013-3694 2013-11-18 2025-04-11 - 6.8 Likely
CVE-2014-1467 2014-02-14 2025-04-11 - 5.0 Likely
CVE-2014-2533 2014-03-18 2025-04-12 - 7.2 Unknown
CVE-2014-2534 2014-03-18 2025-04-12 - 4.9 Unknown
CVE-2014-2389 2014-04-12 2025-04-12 - 9.3 Likely
CVE-2014-1469 2014-08-18 2025-04-12 - 4.9 Unknown
CVE-2014-2388 2014-08-18 2025-04-12 - 6.1 Unknown
CVE-2014-6611 2014-10-25 2025-04-12 - 4.3 Likely
CVE-2015-4111 2015-07-20 2025-04-12 - 6.8 Likely
CVE-2015-4112 2015-11-19 2025-04-12 - 4.3 Likely
CVE-2016-1916 2016-04-22 2025-04-12 5.4 3.5 Unknown
CVE-2016-1917 2016-04-22 2025-04-12 6.1 4.3 Likely
CVE-2016-1918 2016-04-22 2025-04-12 6.1 4.3 Likely
CVE-2016-3126 2016-04-22 2025-04-12 6.1 4.3 Likely
CVE-2016-3129 2016-12-16 2025-04-12 6.6 8.5 Unknown
CVE-2016-3128 2017-01-13 2025-04-20 8.2 6.4 Likely
CVE-2016-3130 2017-01-13 2025-04-20 8.1 4.3 Likely
CVE-2017-3890 2017-01-13 2025-04-20 6.1 4.3 Likely
CVE-2016-3127 2017-03-03 2025-04-20 7.5 5.0 Likely
CVE-2016-1914 2017-04-13 2025-04-20 8.8 6.8 Likely
CVE-2016-1915 2017-04-13 2025-04-20 6.1 4.3 Likely
CVE-2017-3894 2017-05-10 2025-04-20 6.1 4.3 Likely
CVE-2017-9370 2017-08-09 2025-04-20 8.8 6.5 Likely
CVE-2017-9367 2017-10-16 2025-04-20 9.8 6.8 Likely
CVE-2017-9368 2017-10-16 2025-04-20 7.5 5.0 Likely
CVE-2017-3891 2017-11-14 2025-08-22 9.6 6.8 Likely
CVE-2017-3892 2017-11-14 2025-08-26 3.8 5.0 Likely
CVE-2017-3893 2017-11-14 2025-07-22 1.9 6.4 Likely
CVE-2017-9369 2017-11-14 2025-08-26 3.8 4.0 Likely
CVE-2017-9371 2017-11-14 2025-08-22 2.6 4.3 Likely
CVE-2017-17442 2018-03-13 2024-11-21 6.1 4.3 Likely
CVE-2018-8889 2018-09-19 2024-11-21 4.7 4.7 Unknown
CVE-2018-8890 2018-10-12 2024-11-21 7.5 5.0 Likely
CVE-2018-8888 2018-12-20 2024-11-21 4.8 3.5 Unknown
CVE-2018-8891 2018-12-20 2024-11-21 4.8 3.5 Unknown
CVE-2018-8892 2018-12-20 2024-11-21 6.5 4.3 Likely
CVE-2019-8997 2019-03-21 2024-11-21 5.9 4.3 Likely
CVE-2019-8999 2019-04-18 2024-11-21 7.5 5.0 Likely
CVE-2019-8998 2019-07-12 2025-08-22 7.8 4.6 Unknown
CVE-2019-9506 2019-08-14 2024-11-21 8.1 4.8 Unknown
CVE-2012-5828 2020-02-10 2024-11-21 6.5 4.3 Likely
CVE-2020-1938 2020-02-24 2025-10-27 9.8 7.5 Likely
CVE-2020-11652 2020-04-30 2025-11-07 6.5 4.0 Likely
CVE-2020-6932 2020-08-12 2025-08-22 10.0 10.0 Likely
CVE-2020-6933 2020-10-14 2024-11-21 5.5 2.1 Unknown
CVE-2021-22155 2021-05-13 2024-11-21 8.8 6.5 Likely
CVE-2021-22152 2021-05-13 2024-11-21 5.5 2.1 Unknown
CVE-2021-22153 2021-05-13 2024-11-21 7.3 6.0 Unknown
CVE-2021-22154 2021-05-13 2024-11-21 5.3 5.0 Likely
CVE-2021-22156 2021-08-17 2025-08-22 9.0 6.8 Likely
CVE-2020-36486 2021-10-22 2024-11-21 6.1 4.3 Likely
CVE-2021-32021 2021-11-10 2024-11-21 7.8 7.2 Unknown
CVE-2021-32022 2021-11-10 2024-11-21 5.5 2.1 Unknown
CVE-2021-32023 2021-11-10 2024-11-21 7.8 7.2 Unknown
CVE-2021-32024 2021-12-13 2025-09-09 9.8 7.5 Likely
CVE-2021-32025 2022-03-10 2025-08-22 8.1 7.2 Unknown
CVE-2023-21521 2023-09-12 2024-11-21 7.2 - -
CVE-2023-21522 2023-09-12 2024-11-21 6.1 - -
CVE-2023-21520 2023-09-12 2024-11-21 5.3 - -
CVE-2023-21523 2023-09-12 2024-11-21 5.4 - -
CVE-2023-32701 2023-11-14 2025-09-09 7.1 - -
CVE-2024-35213 2024-06-11 2025-12-01 9.0 - -
CVE-2024-35215 2024-10-08 2025-12-01 6.2 - -
CVE-2024-51723 2024-11-25 2025-12-01 4.6 - -
CVE-2024-48854 2025-01-14 2025-01-21 5.3 - -
CVE-2024-48855 2025-01-14 2025-01-21 5.3 - -
CVE-2024-48856 2025-01-14 2025-01-21 9.8 - -
CVE-2024-48857 2025-01-14 2025-01-21 7.5 - -
CVE-2024-48858 2025-01-14 2025-12-01 7.5 - -
CVE-2025-3937 2025-05-22 2025-06-04 7.7 - -
CVE-2025-3938 2025-05-22 2025-06-04 6.8 - -
CVE-2025-3939 2025-05-22 2025-06-04 5.3 - -
CVE-2025-3940 2025-05-22 2025-06-04 5.3 - -
CVE-2025-3942 2025-05-22 2025-06-04 4.3 - -
CVE-2025-3943 2025-05-22 2025-06-04 4.1 - -
CVE-2025-3944 2025-05-22 2025-06-04 7.2 - -
CVE-2025-3945 2025-05-22 2025-06-05 7.2 - -
CVE-2025-2474 2025-06-10 2025-12-01 9.8 - -
CVE-2025-12766 2025-11-19 2025-12-01 5.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for blackberry by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with blackberry's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.