Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

envoyproxy

About This Vendor

envoyproxy is a technology vendor producing software and infrastructure products. As a software provider, envoyproxy's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of envoyproxy's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 98 known vulnerabilities from envoyproxy. This includes 3 critical-severity issues and 55 high-severity issues that represent significant risk. These vulnerabilities affect 314 distinct products across envoyproxy's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2019 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying envoyproxy products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-9900 2019-04-25 2024-11-21 8.3 7.5 Likely
CVE-2019-9901 2019-04-25 2024-11-21 6.5 7.5 Likely
CVE-2019-15225 2019-08-19 2024-11-21 7.5 5.0 Likely
CVE-2019-15226 2019-10-09 2024-11-21 7.5 7.8 Likely
CVE-2019-18836 2019-11-11 2024-11-21 7.5 5.0 Likely
CVE-2019-18801 2019-12-13 2024-11-21 9.8 7.5 Likely
CVE-2019-18802 2019-12-13 2024-11-21 9.8 7.5 Likely
CVE-2019-18838 2019-12-13 2024-11-21 7.5 5.0 Likely
CVE-2020-8660 2020-03-04 2024-11-21 5.3 5.0 Likely
CVE-2020-11767 2020-04-15 2024-11-21 3.1 2.6 Unknown
CVE-2020-12603 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-12604 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-12605 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-8663 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-15104 2020-07-14 2024-11-21 4.6 5.5 Likely
CVE-2020-25017 2020-10-01 2024-11-21 8.3 7.5 Likely
CVE-2020-25018 2020-10-01 2024-11-21 7.5 5.0 Likely
CVE-2020-35470 2020-12-15 2024-11-21 8.8 5.8 Unknown
CVE-2020-35471 2020-12-15 2024-11-21 7.5 5.0 Likely
CVE-2021-21378 2021-03-11 2024-11-21 8.2 6.4 Likely
CVE-2021-28682 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-28683 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-29258 2021-05-20 2024-11-21 7.5 5.0 Likely
CVE-2021-29492 2021-05-28 2024-11-21 8.1 7.5 Likely
CVE-2021-32777 2021-08-24 2024-11-21 8.6 7.5 Likely
CVE-2021-32778 2021-08-24 2024-11-21 5.8 5.0 Likely
CVE-2021-32779 2021-08-24 2024-11-21 8.6 7.5 Likely
CVE-2021-32780 2021-08-24 2024-11-21 8.6 5.0 Likely
CVE-2021-32781 2021-08-24 2024-11-21 8.6 5.0 Likely
CVE-2021-39162 2021-09-09 2024-11-21 8.6 5.0 Likely
CVE-2021-39204 2021-09-09 2024-11-21 7.5 5.0 Likely
CVE-2021-39206 2021-09-09 2024-11-21 8.6 5.0 Likely
CVE-2021-43824 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2021-43825 2022-02-22 2024-11-21 6.1 5.0 Likely
CVE-2021-43826 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2022-21654 2022-02-22 2024-11-21 7.4 6.8 Likely
CVE-2022-21655 2022-02-22 2024-11-21 7.5 4.3 Likely
CVE-2022-21656 2022-02-22 2024-11-21 7.4 5.8 Likely
CVE-2022-21657 2022-02-22 2024-11-21 6.8 4.0 Likely
CVE-2022-23606 2022-02-22 2024-11-21 4.4 4.0 Likely
CVE-2022-29224 2022-06-09 2024-11-21 5.9 4.3 Likely
CVE-2022-29225 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2022-29226 2022-06-09 2024-11-21 10.0 6.4 Likely
CVE-2022-29227 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2022-29228 2022-06-09 2024-11-21 7.5 5.0 Likely
CVE-2023-27487 2023-04-04 2024-11-21 8.2 - -
CVE-2023-27488 2023-04-04 2024-11-21 5.4 - -
CVE-2023-27491 2023-04-04 2024-11-21 5.4 - -
CVE-2023-27492 2023-04-04 2024-11-21 4.8 - -
CVE-2023-27493 2023-04-04 2024-11-21 8.1 - -
CVE-2023-27496 2023-04-04 2024-11-21 6.5 - -
CVE-2023-35945 2023-07-13 2024-11-21 7.5 - -
CVE-2023-35941 2023-07-25 2024-11-21 8.6 - -
CVE-2023-35942 2023-07-25 2024-11-21 6.5 - -
CVE-2023-35943 2023-07-25 2024-11-21 6.3 - -
CVE-2023-35944 2023-07-25 2024-11-21 8.2 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2024-23322 2024-02-09 2024-11-21 7.5 - -
CVE-2024-23323 2024-02-09 2024-11-21 4.3 - -
CVE-2024-23324 2024-02-09 2024-11-21 8.6 - -
CVE-2024-23325 2024-02-09 2024-11-21 7.5 - -
CVE-2024-23327 2024-02-09 2024-11-21 7.5 - -
CVE-2024-27919 2024-04-04 2025-11-04 7.5 - -
CVE-2024-30255 2024-04-04 2025-11-04 5.3 - -
CVE-2024-32475 2024-04-18 2025-09-04 7.5 - -
CVE-2024-23326 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32974 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32975 2024-06-04 2024-11-21 5.9 - -
CVE-2024-32976 2024-06-04 2024-11-21 7.5 - -
CVE-2024-34362 2024-06-04 2024-11-21 5.9 - -
CVE-2024-34363 2024-06-04 2024-11-21 7.5 - -
CVE-2024-34364 2024-06-04 2024-11-21 5.7 - -
CVE-2024-39305 2024-07-01 2025-09-02 6.5 - -
CVE-2024-45806 2024-09-20 2024-10-15 6.5 - -
CVE-2024-45807 2024-09-20 2024-09-25 7.5 - -
CVE-2024-45808 2024-09-20 2024-09-25 6.5 - -
CVE-2024-45809 2024-09-20 2024-09-24 5.3 - -
CVE-2024-45810 2024-09-20 2024-09-24 6.5 - -
CVE-2024-53269 2024-12-18 2025-08-28 4.5 - -
CVE-2024-53270 2024-12-18 2025-09-04 7.5 - -
CVE-2024-53271 2024-12-18 2025-09-04 7.1 - -
CVE-2025-24030 2025-01-23 2025-09-04 7.1 - -
CVE-2025-25294 2025-03-06 2025-09-04 5.3 - -
CVE-2025-30157 2025-03-21 2025-04-01 6.5 - -
CVE-2025-46821 2025-05-07 2025-09-03 5.3 - -
CVE-2025-54588 2025-09-03 2025-09-08 7.5 - -
CVE-2025-55162 2025-09-03 2025-09-08 6.3 - -
CVE-2025-62409 2025-10-16 2025-10-29 7.5 - -
CVE-2025-62504 2025-10-16 2025-10-29 6.5 - -
CVE-2025-64527 2025-12-03 2025-12-05 6.5 - -
CVE-2025-64763 2025-12-03 2025-12-05 3.7 - -
CVE-2025-66220 2025-12-03 2025-12-05 5.0 - -
CVE-2026-22771 2026-01-12 2026-02-05 8.8 - -
CVE-2026-26308 2026-03-10 2026-03-11 7.5 - -
CVE-2026-26309 2026-03-10 2026-03-11 5.3 - -
CVE-2026-26310 2026-03-10 2026-03-11 5.9 - -
CVE-2026-26311 2026-03-10 2026-03-11 5.9 - -
CVE-2026-26330 2026-03-10 2026-03-11 5.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for envoyproxy by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with envoyproxy's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.