Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

kubernetes

About This Vendor

kubernetes is a technology vendor producing software and infrastructure products. As a software provider, kubernetes's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of kubernetes's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 93 known vulnerabilities from kubernetes. This includes 6 critical-severity issues and 34 high-severity issues that represent significant risk. These vulnerabilities affect 40 distinct products across kubernetes's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2016 through 2026, indicating decades of continuous security attention and research. Organizations deploying kubernetes products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2016-1905 2016-02-03 2025-04-12 7.7 4.0 Likely
CVE-2016-1906 2016-02-03 2025-04-12 9.8 10.0 Likely
CVE-2015-7528 2016-04-11 2025-04-12 5.3 5.0 Likely
CVE-2017-1000056 2017-07-17 2025-04-20 9.8 7.5 Likely
CVE-2015-7561 2017-08-07 2025-04-20 3.1 3.5 Unknown
CVE-2017-1002100 2017-09-14 2025-04-20 6.5 4.0 Likely
CVE-2017-1002101 2018-03-13 2024-11-21 8.8 5.5 Likely
CVE-2017-1002102 2018-03-13 2024-11-21 7.1 6.3 Unknown
CVE-2018-1000400 2018-05-18 2024-11-21 8.8 6.5 Likely
CVE-2018-1002100 2018-06-02 2024-11-21 4.2 3.6 Unknown
CVE-2016-7075 2018-09-10 2024-11-21 7.5 6.8 Likely
CVE-2018-1002101 2018-12-05 2024-11-21 5.9 7.5 Likely
CVE-2018-1002103 2018-12-05 2024-11-21 8.1 6.8 Likely
CVE-2018-1002105 2018-12-05 2024-11-21 9.8 7.5 Likely
CVE-2018-18264 2019-01-03 2024-11-21 7.5 5.0 Likely
CVE-2019-1002100 2019-04-01 2024-11-21 6.5 4.0 Likely
CVE-2019-1002101 2019-04-01 2024-11-21 6.4 5.8 Likely
CVE-2019-9946 2019-04-02 2024-11-21 7.5 5.0 Likely
CVE-2019-11243 2019-04-22 2024-11-21 8.1 4.3 Likely
CVE-2019-11244 2019-04-22 2024-11-21 5.0 1.9 Unknown
CVE-2019-11245 2019-08-29 2024-11-21 4.9 4.6 Unknown
CVE-2019-11246 2019-08-29 2024-11-21 6.5 4.3 Likely
CVE-2019-11247 2019-08-29 2024-11-21 8.1 6.5 Likely
CVE-2019-11248 2019-08-29 2024-11-21 8.2 6.4 Likely
CVE-2019-11249 2019-08-29 2024-11-21 6.5 5.8 Likely
CVE-2019-11250 2019-08-29 2024-11-21 6.5 3.5 Unknown
CVE-2019-11253 2019-10-17 2026-02-24 7.5 5.0 Likely
CVE-2019-10223 2019-11-05 2024-11-21 6.5 4.0 Likely
CVE-2019-14891 2019-11-25 2024-11-21 5.0 6.0 Unknown
CVE-2018-1002102 2019-12-05 2024-11-21 2.6 2.1 Unknown
CVE-2019-11255 2019-12-05 2024-11-21 4.8 5.5 Likely
CVE-2018-1002104 2020-01-14 2024-11-21 5.3 5.0 Likely
CVE-2019-11251 2020-02-03 2024-11-21 4.8 4.3 Likely
CVE-2020-8551 2020-03-27 2024-11-21 4.3 3.3 Unknown
CVE-2020-8552 2020-03-27 2024-11-21 5.3 4.0 Likely
CVE-2019-11254 2020-04-01 2024-11-21 6.5 4.0 Likely
CVE-2020-8555 2020-06-05 2024-11-21 6.3 3.5 Unknown
CVE-2020-8559 2020-07-22 2024-11-21 6.4 6.0 Unknown
CVE-2019-11252 2020-07-23 2024-11-21 5.9 5.0 Likely
CVE-2020-8557 2020-07-23 2024-11-21 5.5 2.1 Unknown
CVE-2020-8558 2020-07-27 2024-11-21 5.4 5.8 Unknown
CVE-2020-8553 2020-07-29 2024-11-21 5.9 4.9 Unknown
CVE-2020-8563 2020-12-07 2024-11-21 4.7 2.1 Unknown
CVE-2020-8564 2020-12-07 2024-11-21 4.7 2.1 Unknown
CVE-2020-8565 2020-12-07 2024-11-21 4.7 2.1 Unknown
CVE-2020-8566 2020-12-07 2024-11-21 4.7 2.1 Unknown
CVE-2020-8554 2021-01-21 2024-11-21 6.3 6.0 Unknown
CVE-2020-8568 2021-01-21 2024-11-21 5.8 4.9 Unknown
CVE-2020-8569 2021-01-21 2024-11-21 4.3 4.0 Likely
CVE-2020-8570 2021-01-21 2024-11-21 9.1 6.4 Likely
CVE-2021-25735 2021-09-06 2024-11-21 6.5 5.5 Likely
CVE-2021-25737 2021-09-06 2024-11-21 2.7 4.9 Unknown
CVE-2020-8561 2021-09-20 2024-11-21 4.1 4.0 Likely
CVE-2021-25740 2021-09-20 2024-11-21 3.1 3.5 Unknown
CVE-2021-25741 2021-09-20 2024-11-21 8.8 5.5 Likely
CVE-2021-25738 2021-10-11 2024-11-21 6.7 4.6 Unknown
CVE-2021-25742 2021-10-29 2024-11-21 7.6 5.5 Likely
CVE-2021-25743 2022-01-07 2026-01-13 3.0 2.1 Unknown
CVE-2020-8562 2022-02-01 2024-11-21 2.2 3.5 Unknown
CVE-2022-0532 2022-02-09 2024-11-21 4.2 4.9 Unknown
CVE-2022-0811 2022-03-16 2024-11-21 8.8 9.0 Likely
CVE-2022-27652 2022-04-18 2024-11-21 5.3 4.6 Unknown
CVE-2021-25745 2022-05-06 2024-11-21 7.6 5.5 Likely
CVE-2021-25746 2022-05-06 2024-11-21 7.6 5.5 Likely
CVE-2022-1708 2022-06-07 2024-11-21 7.5 7.8 Likely
CVE-2022-2385 2022-07-12 2024-11-21 8.1 6.0 Unknown
CVE-2022-2995 2022-09-19 2025-05-29 7.1 - -
CVE-2022-3162 2023-03-01 2024-11-21 6.5 - -
CVE-2022-3294 2023-03-01 2024-11-21 6.6 - -
CVE-2021-25748 2023-05-24 2024-11-21 7.6 - -
CVE-2021-25749 2023-05-24 2024-11-21 7.8 - -
CVE-2023-1174 2023-05-24 2024-11-21 9.8 - -
CVE-2023-1944 2023-05-24 2024-11-21 8.4 - -
CVE-2023-2878 2023-06-07 2025-02-13 6.5 - -
CVE-2023-2431 2023-06-16 2024-12-12 3.4 - -
CVE-2023-2727 2023-07-03 2025-02-13 6.5 - -
CVE-2023-2728 2023-07-03 2025-02-13 6.5 - -
CVE-2022-3466 2023-09-15 2024-11-21 4.8 - -
CVE-2023-1260 2023-09-24 2024-11-21 8.0 - -
CVE-2022-4318 2023-09-25 2024-11-21 7.8 - -
CVE-2023-1943 2023-10-12 2024-11-21 8.0 - -
CVE-2022-4886 2023-10-25 2025-02-13 8.8 - -
CVE-2023-5043 2023-10-25 2025-02-13 7.6 - -
CVE-2023-5044 2023-10-25 2025-02-13 7.6 - -
CVE-2021-25736 2023-10-30 2025-06-12 5.8 - -
CVE-2023-3676 2023-10-31 2025-02-13 8.8 - -
CVE-2023-3955 2023-10-31 2025-02-13 8.8 - -
CVE-2023-3893 2023-11-03 2025-08-01 8.8 - -
CVE-2022-3172 2023-11-03 2025-02-13 5.1 - -
CVE-2023-5528 2023-11-14 2025-01-03 7.2 - -
CVE-2024-5154 2024-06-12 2025-06-23 8.1 - -
CVE-2025-57870 2025-10-22 2025-10-31 10.0 - -
CVE-2026-22549 2026-02-04 2026-02-13 4.9 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for kubernetes by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with kubernetes's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.