Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

denx

About This Vendor

denx is a technology vendor producing software and infrastructure products. As a software provider, denx's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of denx's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 44 known vulnerabilities from denx. This includes 18 critical-severity issues and 19 high-severity issues that represent significant risk. These vulnerabilities affect 10 distinct products across denx's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2025, reflecting sustained security scrutiny over multiple years. Organizations deploying denx products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-1000205 2018-06-26 2024-11-21 5.5 4.3 Likely
CVE-2017-3225 2018-07-24 2024-11-21 4.6 2.1 Unknown
CVE-2017-3226 2018-07-24 2024-11-21 6.4 4.4 Unknown
CVE-2018-18439 2018-11-20 2024-11-21 9.8 10.0 Likely
CVE-2018-18440 2018-11-20 2024-11-21 7.8 7.2 Unknown
CVE-2018-3968 2019-03-21 2024-11-21 7.0 4.4 Unknown
CVE-2019-11690 2019-05-03 2024-11-21 5.9 4.3 Likely
CVE-2019-11059 2019-05-10 2024-11-21 9.8 7.5 Likely
CVE-2019-13103 2019-07-29 2024-11-21 7.1 3.6 Unknown
CVE-2019-14192 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14193 2019-07-31 2026-02-10 9.8 7.5 Likely
CVE-2019-14194 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14195 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14196 2019-07-31 2025-11-03 9.8 7.5 Likely
CVE-2019-14197 2019-07-31 2024-11-21 9.1 6.4 Likely
CVE-2019-14198 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14199 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14200 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14201 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14202 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14203 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-14204 2019-07-31 2024-11-21 9.8 7.5 Likely
CVE-2019-13104 2019-08-06 2024-11-21 7.8 6.8 Likely
CVE-2019-13105 2019-08-06 2024-11-21 7.8 6.8 Likely
CVE-2019-13106 2019-08-06 2024-11-21 7.8 8.3 Likely
CVE-2020-8432 2020-01-29 2024-11-21 9.8 10.0 Likely
CVE-2020-10648 2020-03-19 2024-11-21 7.8 6.8 Likely
CVE-2021-27097 2021-02-17 2025-11-03 7.8 6.8 Likely
CVE-2021-27138 2021-02-17 2025-11-03 7.8 6.8 Likely
CVE-2022-30767 2022-05-16 2025-11-03 9.8 7.5 Likely
CVE-2022-30552 2022-06-08 2025-11-03 5.5 2.1 Unknown
CVE-2022-30790 2022-06-08 2025-11-03 7.8 7.2 Unknown
CVE-2022-34835 2022-06-30 2025-11-03 9.8 7.5 Likely
CVE-2022-33103 2022-07-01 2025-11-03 7.8 4.6 Unknown
CVE-2022-33967 2022-07-20 2025-11-03 7.8 - -
CVE-2022-2347 2022-09-23 2025-11-03 7.7 - -
CVE-2024-57254 2025-02-18 2025-11-03 7.1 - -
CVE-2024-57255 2025-02-18 2025-11-03 7.1 - -
CVE-2024-57256 2025-02-18 2025-11-03 7.1 - -
CVE-2024-57257 2025-02-18 2025-11-03 2.0 - -
CVE-2024-57258 2025-02-18 2025-11-03 7.1 - -
CVE-2024-57259 2025-02-18 2025-11-03 7.1 - -
CVE-2025-45512 2025-08-05 2025-10-02 6.5 - -
CVE-2025-24857 2025-12-10 2026-01-21 7.6 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for denx by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with denx's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.