Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

cloudflare

About This Vendor

cloudflare is a technology vendor producing software and infrastructure products. As a software provider, cloudflare's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of cloudflare's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 57 known vulnerabilities from cloudflare. This includes 4 critical-severity issues and 18 high-severity issues that represent significant risk. These vulnerabilities affect 24 distinct products across cloudflare's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2020 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying cloudflare products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-24356 2020-10-02 2024-11-21 6.4 4.6 Unknown
CVE-2020-35152 2021-02-03 2024-11-21 4.5 4.6 Unknown
CVE-2021-3761 2021-09-09 2024-11-21 7.5 5.0 Likely
CVE-2021-3907 2021-11-11 2024-11-21 7.4 7.5 Likely
CVE-2021-3908 2021-11-11 2024-11-21 5.9 5.0 Likely
CVE-2021-3909 2021-11-11 2024-11-21 4.4 5.0 Likely
CVE-2021-3910 2021-11-11 2024-11-21 4.4 5.0 Likely
CVE-2021-3911 2021-11-11 2024-11-21 4.2 4.3 Likely
CVE-2021-3912 2021-11-11 2024-11-21 4.2 4.3 Likely
CVE-2022-2147 2022-06-23 2024-11-21 6.5 4.6 Unknown
CVE-2022-2145 2022-06-28 2024-11-21 5.8 7.2 Unknown
CVE-2022-2225 2022-07-26 2024-11-21 8.1 - -
CVE-2022-2529 2022-09-30 2024-11-21 7.5 - -
CVE-2022-3616 2022-10-28 2024-11-21 5.4 - -
CVE-2022-3320 2022-10-28 2024-11-21 6.7 - -
CVE-2022-3321 2022-10-28 2024-11-21 6.7 - -
CVE-2022-3322 2022-10-28 2024-11-21 6.7 - -
CVE-2022-3337 2022-10-28 2024-11-21 6.7 - -
CVE-2022-3512 2022-10-28 2024-11-21 6.7 - -
CVE-2014-125026 2022-12-27 2025-04-11 9.8 - -
CVE-2022-4428 2023-01-11 2024-11-21 8.9 - -
CVE-2022-4457 2023-01-11 2024-11-21 5.5 - -
CVE-2023-1314 2023-03-21 2024-11-21 7.5 - -
CVE-2023-1412 2023-04-05 2024-11-21 7.0 - -
CVE-2023-0652 2023-04-06 2024-11-21 7.0 - -
CVE-2023-1732 2023-05-10 2024-11-21 5.3 - -
CVE-2023-2512 2023-05-12 2024-11-21 6.5 - -
CVE-2023-3036 2023-06-14 2024-11-21 8.6 - -
CVE-2023-3040 2023-06-14 2024-11-21 3.7 - -
CVE-2023-1862 2023-06-20 2024-11-21 7.3 - -
CVE-2023-2754 2023-08-03 2024-11-21 7.4 - -
CVE-2023-3348 2023-08-03 2024-11-21 5.7 - -
CVE-2023-3766 2023-08-03 2024-11-21 5.9 - -
CVE-2023-4241 2023-08-16 2024-11-21 7.5 - -
CVE-2023-0238 2023-08-29 2024-11-21 3.9 - -
CVE-2023-0654 2023-08-29 2024-11-21 3.9 - -
CVE-2023-3747 2023-09-07 2024-11-21 5.5 - -
CVE-2023-6180 2023-12-05 2024-11-21 5.3 - -
CVE-2023-6193 2023-12-12 2024-11-21 5.3 - -
CVE-2023-7078 2023-12-29 2024-11-21 7.5 - -
CVE-2023-7079 2023-12-29 2024-11-21 6.4 - -
CVE-2023-7080 2023-12-29 2024-11-21 8.5 - -
CVE-2023-6992 2024-01-04 2024-11-21 4.0 - -
CVE-2024-0212 2024-01-29 2024-11-21 8.1 - -
CVE-2024-1410 2024-03-12 2025-08-06 3.7 - -
CVE-2024-1765 2024-03-12 2025-08-06 5.9 - -
CVE-2025-0651 2025-01-22 2025-07-31 7.1 - -
CVE-2021-3978 2025-01-29 2025-07-29 7.5 - -
CVE-2025-4143 2025-05-01 2025-05-12 6.1 - -
CVE-2025-4144 2025-05-01 2025-05-12 9.8 - -
CVE-2025-4366 2025-05-22 2025-08-06 6.1 - -
CVE-2025-6087 2025-06-16 2025-08-06 9.1 - -
CVE-2025-4820 2025-06-18 2025-11-06 5.3 - -
CVE-2025-4821 2025-06-18 2025-11-06 7.5 - -
CVE-2025-7054 2025-08-07 2025-08-14 6.5 - -
CVE-2025-13353 2025-12-02 2025-12-15 5.5 - -
CVE-2026-0933 2026-01-20 2026-01-27 9.9 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for cloudflare by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with cloudflare's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.