Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

insyde

About This Vendor

insyde is a technology vendor producing software and infrastructure products. As a software provider, insyde's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of insyde's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 104 known vulnerabilities from insyde. This includes 3 critical-severity issues and 75 high-severity issues that represent significant risk. These vulnerabilities affect 718 distinct products across insyde's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2005 through 2025, indicating decades of continuous security attention and research. Organizations deploying insyde products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-4175 2005-12-11 2025-04-03 - 2.1 Unknown
CVE-2019-12532 2019-08-26 2024-11-21 7.8 4.6 Unknown
CVE-2020-27339 2021-06-16 2025-11-04 6.7 7.2 Unknown
CVE-2021-33626 2021-10-01 2025-11-04 7.8 4.6 Unknown
CVE-2020-5955 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-38575 2021-12-01 2025-11-03 8.1 6.8 Likely
CVE-2020-5956 2022-01-05 2024-11-21 7.5 5.0 Likely
CVE-2021-45969 2022-01-05 2025-11-04 8.2 7.2 Unknown
CVE-2021-45970 2022-01-05 2025-11-04 8.2 7.2 Unknown
CVE-2021-41842 2022-01-06 2024-11-21 9.8 7.5 Likely
CVE-2021-45971 2022-01-06 2025-11-04 8.2 7.2 Unknown
CVE-2021-43522 2022-02-03 2025-11-04 7.5 6.9 Unknown
CVE-2022-24069 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2020-5953 2022-02-03 2025-11-04 7.5 6.9 Unknown
CVE-2021-33625 2022-02-03 2025-11-04 7.5 6.9 Unknown
CVE-2021-33627 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-41837 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-41838 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-41839 2022-02-03 2025-11-04 8.2 4.6 Unknown
CVE-2021-41840 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-41841 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-42059 2022-02-03 2025-11-04 6.7 7.2 Unknown
CVE-2021-42060 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-42113 2022-02-03 2025-11-04 8.2 4.6 Unknown
CVE-2021-42554 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-43323 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-43615 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2022-24030 2022-02-03 2025-11-04 7.5 6.9 Unknown
CVE-2022-24031 2022-02-03 2025-11-04 8.2 7.2 Unknown
CVE-2021-38578 2022-03-03 2025-11-03 7.4 7.5 Likely
CVE-2022-35895 2022-09-21 2025-05-05 8.2 - -
CVE-2022-35896 2022-09-22 2025-05-05 6.0 - -
CVE-2022-35408 2022-09-22 2025-05-27 8.2 - -
CVE-2022-35894 2022-09-22 2025-05-05 6.0 - -
CVE-2022-36338 2022-09-23 2025-05-05 8.2 - -
CVE-2022-35893 2022-09-23 2025-05-05 8.2 - -
CVE-2022-36448 2022-09-28 2025-05-21 8.2 - -
CVE-2022-30773 2022-11-14 2025-04-30 6.4 - -
CVE-2022-32266 2022-11-14 2025-04-30 6.4 - -
CVE-2022-33907 2022-11-14 2025-04-30 6.4 - -
CVE-2022-33982 2022-11-14 2025-04-30 6.4 - -
CVE-2022-34325 2022-11-14 2025-04-30 7.8 - -
CVE-2022-30774 2022-11-15 2025-04-30 6.4 - -
CVE-2022-31243 2022-11-15 2025-04-30 6.4 - -
CVE-2022-32267 2022-11-15 2025-04-30 6.4 - -
CVE-2022-33905 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33906 2022-11-15 2025-04-30 6.4 - -
CVE-2022-33908 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33909 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33983 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33984 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33985 2022-11-15 2025-04-30 7.0 - -
CVE-2022-33986 2022-11-15 2025-04-30 6.4 - -
CVE-2022-29275 2022-11-15 2025-04-30 8.2 - -
CVE-2022-30283 2022-11-15 2025-04-30 7.5 - -
CVE-2022-30771 2022-11-15 2025-04-30 8.2 - -
CVE-2022-30772 2022-11-15 2025-04-30 8.2 - -
CVE-2022-29276 2022-11-15 2025-04-30 8.2 - -
CVE-2022-29278 2022-11-15 2025-04-30 8.2 - -
CVE-2022-29279 2022-11-15 2025-04-30 8.2 - -
CVE-2022-35897 2022-11-21 2025-04-30 6.8 - -
CVE-2022-35407 2022-11-22 2025-04-29 7.8 - -
CVE-2022-36337 2022-11-23 2025-04-25 8.2 - -
CVE-2022-32471 2023-02-15 2025-05-05 7.0 - -
CVE-2022-32474 2023-02-15 2025-03-20 7.0 - -
CVE-2022-32478 2023-02-15 2025-03-19 7.0 - -
CVE-2022-32954 2023-02-15 2025-03-20 7.0 - -
CVE-2022-32955 2023-02-15 2025-03-19 7.0 - -
CVE-2022-32470 2023-02-15 2025-05-05 7.0 - -
CVE-2022-32473 2023-02-15 2025-03-20 7.0 - -
CVE-2022-32476 2023-02-15 2025-03-20 7.0 - -
CVE-2022-32953 2023-02-15 2025-05-05 7.0 - -
CVE-2022-32469 2023-02-15 2025-05-05 7.0 - -
CVE-2022-32475 2023-02-15 2025-05-05 7.0 - -
CVE-2022-32477 2023-02-15 2025-05-05 7.0 - -
CVE-2023-22612 2023-04-11 2025-02-11 8.8 - -
CVE-2023-22614 2023-04-11 2025-02-11 8.8 - -
CVE-2023-22615 2023-04-11 2025-02-11 8.4 - -
CVE-2023-22613 2023-04-11 2025-02-11 8.8 - -
CVE-2022-24350 2023-04-12 2025-03-19 5.5 - -
CVE-2023-22616 2023-04-12 2025-02-10 7.8 - -
CVE-2023-25600 2023-08-03 2024-11-21 7.1 - -
CVE-2023-28468 2023-08-03 2024-11-21 6.5 - -
CVE-2023-27373 2023-08-07 2025-03-07 5.5 - -
CVE-2023-31041 2023-08-14 2024-11-21 7.5 - -
CVE-2023-27471 2023-08-18 2024-11-21 5.5 - -
CVE-2021-33834 2023-09-08 2024-11-21 7.1 - -
CVE-2023-34195 2023-09-18 2024-11-21 7.8 - -
CVE-2023-30633 2023-10-19 2024-11-21 5.3 - -
CVE-2023-39281 2023-11-01 2024-11-21 9.8 - -
CVE-2023-39284 2023-11-02 2024-11-21 5.5 - -
CVE-2023-39283 2023-11-02 2024-11-21 7.8 - -
CVE-2023-40238 2023-12-07 2026-02-25 5.5 - -
CVE-2022-24351 2023-12-16 2024-11-21 4.7 - -
CVE-2022-46897 2024-04-22 2025-07-29 5.3 - -
CVE-2023-47252 2024-04-26 2025-07-29 6.3 - -
CVE-2024-25078 2024-05-15 2025-07-29 7.4 - -
CVE-2024-25079 2024-05-15 2025-08-04 7.4 - -
CVE-2024-49200 2025-04-15 2025-04-30 6.4 - -
CVE-2024-52877 2025-05-15 2025-08-15 7.5 - -
CVE-2024-52878 2025-05-15 2025-08-15 7.5 - -
CVE-2024-52879 2025-05-15 2025-08-15 7.5 - -
CVE-2024-52880 2025-05-15 2025-07-29 7.9 - -
CVE-2024-55567 2025-06-12 2025-08-20 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for insyde by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with insyde's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.