Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

realtek

About This Vendor

realtek is a technology vendor producing software and infrastructure products. As a software provider, realtek's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of realtek's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 73 known vulnerabilities from realtek. This includes 9 critical-severity issues and 48 high-severity issues that represent significant risk. These vulnerabilities affect 205 distinct products across realtek's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2025, indicating decades of continuous security attention and research. Organizations deploying realtek products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-1931 2008-04-25 2025-04-09 - 6.8 Unknown
CVE-2008-1932 2008-04-25 2025-04-09 - 6.8 Unknown
CVE-2008-5664 2008-12-19 2025-04-09 - 9.3 Likely
CVE-2014-8361 2015-05-01 2025-10-22 9.8 10.0 Likely
CVE-2017-3767 2017-11-13 2025-04-20 7.8 7.2 Unknown
CVE-2019-19822 2020-01-27 2024-11-21 7.5 5.0 Likely
CVE-2019-19823 2020-01-27 2024-11-21 7.5 5.0 Likely
CVE-2019-11867 2020-02-12 2024-11-21 5.5 2.1 Unknown
CVE-2020-12773 2020-06-08 2024-11-21 9.6 6.5 Likely
CVE-2020-9395 2020-07-06 2024-11-21 8.0 4.9 Unknown
CVE-2019-18990 2020-09-30 2024-11-21 5.4 4.8 Unknown
CVE-2020-25853 2021-02-03 2024-11-21 7.5 5.0 Likely
CVE-2020-25854 2021-02-03 2024-11-21 8.1 6.8 Likely
CVE-2020-25855 2021-02-03 2024-11-21 8.1 6.8 Likely
CVE-2020-25856 2021-02-03 2024-11-21 8.1 6.8 Likely
CVE-2020-25857 2021-02-03 2024-11-21 7.5 5.0 Likely
CVE-2021-27372 2021-03-25 2024-11-21 9.8 10.0 Likely
CVE-2020-23539 2021-04-08 2024-11-21 7.5 7.8 Likely
CVE-2020-27301 2021-06-04 2024-11-21 8.0 7.7 Unknown
CVE-2020-27302 2021-06-04 2024-11-21 8.0 7.7 Unknown
CVE-2021-32537 2021-07-07 2024-11-21 6.5 4.9 Unknown
CVE-2021-35392 2021-08-16 2025-08-13 7.5 7.8 Likely
CVE-2021-35393 2021-08-16 2025-08-13 9.8 10.0 Likely
CVE-2021-35394 2021-08-16 2025-11-07 9.8 10.0 Likely
CVE-2021-35395 2021-08-16 2025-11-07 9.8 10.0 Likely
CVE-2021-36922 2021-11-02 2024-11-21 7.8 7.2 Unknown
CVE-2021-36923 2021-11-02 2024-11-21 7.8 7.2 Unknown
CVE-2021-36924 2021-11-02 2024-11-21 7.8 7.2 Unknown
CVE-2021-36925 2021-11-02 2024-11-21 7.8 7.2 Unknown
CVE-2021-43573 2021-11-11 2024-11-21 9.8 7.5 Likely
CVE-2021-39306 2021-12-22 2024-11-21 9.8 7.5 Likely
CVE-2022-21742 2022-06-20 2024-11-21 6.2 3.3 Unknown
CVE-2022-29558 2022-07-28 2024-11-21 8.8 - -
CVE-2022-27255 2022-08-01 2024-11-21 9.8 7.5 Likely
CVE-2022-25635 2022-08-30 2024-11-21 6.5 - -
CVE-2022-26527 2022-08-30 2024-11-21 6.5 - -
CVE-2022-26528 2022-08-30 2024-11-21 6.5 - -
CVE-2022-26529 2022-08-30 2024-11-21 6.5 - -
CVE-2022-34326 2022-09-27 2025-05-21 7.5 - -
CVE-2022-32966 2022-11-29 2024-11-21 6.5 - -
CVE-2022-32967 2022-11-29 2024-11-21 2.1 - -
CVE-2022-40740 2023-01-03 2024-11-21 7.2 - -
CVE-2020-26652 2023-08-22 2024-11-21 7.5 - -
CVE-2022-25477 2024-07-02 2024-11-21 5.5 - -
CVE-2022-25478 2024-07-02 2024-11-21 7.8 - -
CVE-2022-25479 2024-07-02 2024-11-21 5.5 - -
CVE-2022-25480 2024-07-02 2025-03-25 7.8 - -
CVE-2023-34435 2024-07-08 2025-11-04 7.2 - -
CVE-2023-41251 2024-07-08 2025-11-04 7.2 - -
CVE-2023-45215 2024-07-08 2025-11-04 7.2 - -
CVE-2023-45742 2024-07-08 2025-11-04 7.2 - -
CVE-2023-47677 2024-07-08 2025-11-04 8.8 - -
CVE-2023-47856 2024-07-08 2025-11-04 7.2 - -
CVE-2023-48270 2024-07-08 2025-11-04 7.2 - -
CVE-2023-49073 2024-07-08 2025-11-04 7.2 - -
CVE-2023-49595 2024-07-08 2025-11-04 7.2 - -
CVE-2023-49867 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50239 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50240 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50243 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50244 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50330 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50381 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50382 2024-07-08 2025-11-04 7.2 - -
CVE-2023-50383 2024-07-08 2025-11-04 7.2 - -
CVE-2024-21778 2024-07-08 2025-11-04 7.2 - -
CVE-2025-44531 2025-06-24 2025-07-09 7.5 - -
CVE-2025-44526 2025-07-09 2025-07-18 6.5 - -
CVE-2025-8298 2025-09-02 2025-09-10 3.8 - -
CVE-2025-8299 2025-09-02 2025-09-10 8.8 - -
CVE-2025-8300 2025-09-02 2025-09-10 8.8 - -
CVE-2025-8301 2025-09-02 2025-09-10 7.8 - -
CVE-2025-8302 2025-09-02 2025-09-10 8.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for realtek by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with realtek's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.