Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ni

About This Vendor

ni is a technology vendor producing software and infrastructure products. As a software provider, ni's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ni's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 70 known vulnerabilities from ni. This includes 3 critical-severity issues and 60 high-severity issues that represent significant risk. These vulnerabilities affect 25 distinct products across ni's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2013 through 2025, indicating decades of continuous security attention and research. Organizations deploying ni products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-5021 2013-08-06 2025-04-11 - 9.3 Likely
CVE-2013-5022 2013-08-06 2025-04-11 - 10.0 Likely
CVE-2013-5023 2013-08-06 2025-04-11 - 4.3 Likely
CVE-2013-5024 2013-08-06 2025-04-11 - 4.3 Likely
CVE-2013-5025 2013-08-06 2025-04-11 - 4.3 Likely
CVE-2013-5026 2013-08-06 2025-04-11 - 9.3 Likely
CVE-2017-2775 2017-03-31 2025-04-20 7.5 6.8 Likely
CVE-2017-2779 2017-09-05 2025-04-20 7.5 6.8 Likely
CVE-2020-25191 2020-12-11 2024-11-21 7.5 7.8 Likely
CVE-2021-38304 2021-09-17 2024-11-21 7.8 4.6 Unknown
CVE-2021-42563 2021-11-12 2024-11-21 7.8 4.6 Unknown
CVE-2022-27237 2022-04-21 2024-11-21 6.1 4.3 Likely
CVE-2022-35415 2022-09-16 2024-11-21 7.8 - -
CVE-2022-42718 2022-12-01 2025-04-24 7.8 - -
CVE-2023-4570 2023-10-05 2024-11-21 8.8 - -
CVE-2023-4601 2023-10-18 2024-11-21 8.1 - -
CVE-2023-5136 2023-11-08 2024-11-21 5.5 - -
CVE-2024-23608 2024-03-11 2025-02-27 7.8 - -
CVE-2024-23609 2024-03-11 2025-02-27 7.8 - -
CVE-2024-23610 2024-03-11 2025-02-27 7.8 - -
CVE-2024-23611 2024-03-11 2025-02-27 7.8 - -
CVE-2024-23612 2024-03-11 2025-02-27 7.8 - -
CVE-2024-6121 2024-07-22 2024-11-21 7.8 - -
CVE-2024-6122 2024-07-22 2024-11-21 5.5 - -
CVE-2024-6638 2024-07-22 2025-03-06 5.5 - -
CVE-2024-6791 2024-07-22 2024-11-21 7.8 - -
CVE-2024-6793 2024-07-22 2024-11-21 9.8 - -
CVE-2024-6794 2024-07-22 2024-11-21 9.8 - -
CVE-2024-6805 2024-07-22 2024-11-21 7.5 - -
CVE-2024-6806 2024-07-22 2024-11-21 9.8 - -
CVE-2024-4079 2024-07-23 2024-11-21 7.8 - -
CVE-2024-4080 2024-07-23 2025-09-29 7.8 - -
CVE-2024-4081 2024-07-23 2025-09-29 7.8 - -
CVE-2024-10494 2024-12-10 2025-03-04 7.8 - -
CVE-2024-10495 2024-12-10 2025-03-04 7.8 - -
CVE-2024-10496 2024-12-10 2025-03-04 7.8 - -
CVE-2025-2449 2025-03-18 2025-08-18 8.8 - -
CVE-2025-2450 2025-03-18 2025-08-18 8.8 - -
CVE-2025-2629 2025-04-09 2025-08-18 7.3 - -
CVE-2025-2630 2025-04-09 2025-08-18 7.3 - -
CVE-2025-2631 2025-04-09 2025-08-18 7.8 - -
CVE-2025-2632 2025-04-09 2025-08-18 7.8 - -
CVE-2025-30417 2025-05-15 2025-05-20 7.8 - -
CVE-2025-30418 2025-05-15 2025-05-20 7.8 - -
CVE-2025-30419 2025-05-15 2025-05-20 7.8 - -
CVE-2025-30420 2025-05-15 2025-05-20 7.8 - -
CVE-2025-30421 2025-05-15 2025-05-20 7.8 - -
CVE-2025-2633 2025-07-23 2025-08-19 7.8 - -
CVE-2025-2634 2025-07-23 2025-08-19 7.8 - -
CVE-2025-7361 2025-07-29 2025-08-19 7.8 - -
CVE-2025-7848 2025-07-29 2025-08-19 7.8 - -
CVE-2025-7849 2025-07-29 2025-08-19 7.8 - -
CVE-2025-57774 2025-09-02 2025-10-09 7.8 - -
CVE-2025-57775 2025-09-02 2025-10-09 7.8 - -
CVE-2025-57776 2025-09-02 2025-10-09 7.8 - -
CVE-2025-57777 2025-09-02 2025-10-09 7.8 - -
CVE-2025-57778 2025-09-02 2025-10-09 7.8 - -
CVE-2025-9188 2025-09-02 2025-10-09 7.8 - -
CVE-2025-9189 2025-09-02 2025-10-09 7.8 - -
CVE-2025-6033 2025-09-30 2025-10-07 7.8 - -
CVE-2025-6034 2025-09-30 2025-10-07 7.8 - -
CVE-2025-64461 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64462 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64463 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64464 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64465 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64466 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64467 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64468 2025-12-18 2025-12-24 7.8 - -
CVE-2025-64469 2025-12-18 2025-12-24 7.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ni by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ni's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.