Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

silabs

About This Vendor

silabs is a technology vendor producing software and infrastructure products. As a software provider, silabs's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of silabs's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 85 known vulnerabilities from silabs. This includes 16 critical-severity issues and 20 high-severity issues that represent significant risk. These vulnerabilities affect 83 distinct products across silabs's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying silabs products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-19983 2018-12-09 2024-11-21 6.5 6.1 Unknown
CVE-2020-15531 2020-08-20 2024-11-21 8.8 5.8 Unknown
CVE-2020-15532 2020-08-20 2024-11-21 6.5 3.3 Unknown
CVE-2020-13582 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2021-31609 2021-09-07 2024-11-21 6.5 3.3 Unknown
CVE-2020-10137 2022-01-10 2024-11-21 6.5 3.3 Unknown
CVE-2020-9057 2022-01-10 2024-11-21 8.8 8.3 Unknown
CVE-2020-9058 2022-01-10 2024-11-21 8.1 4.8 Unknown
CVE-2020-9059 2022-01-10 2024-11-21 6.5 6.1 Unknown
CVE-2020-9060 2022-01-10 2024-11-21 6.5 6.1 Unknown
CVE-2020-9061 2022-01-10 2024-11-21 6.5 3.3 Unknown
CVE-2013-20003 2022-02-04 2024-11-21 8.3 7.9 Unknown
CVE-2018-25029 2022-02-04 2024-11-21 8.1 4.8 Unknown
CVE-2021-27411 2022-05-03 2024-11-21 6.5 6.4 Likely
CVE-2022-24611 2022-05-17 2024-11-21 6.5 6.1 Unknown
CVE-2022-24936 2022-11-02 2024-11-21 8.3 - -
CVE-2022-24937 2022-11-14 2024-11-21 6.5 - -
CVE-2022-24938 2022-11-14 2024-11-21 6.5 - -
CVE-2022-24942 2022-11-15 2024-11-21 9.1 - -
CVE-2022-24939 2022-11-18 2024-11-21 5.7 - -
CVE-2023-1261 2023-03-21 2024-11-21 8.2 - -
CVE-2023-1262 2023-03-21 2024-11-21 8.2 - -
CVE-2023-0775 2023-03-28 2024-11-21 6.5 - -
CVE-2023-0965 2023-05-18 2024-11-21 3.1 - -
CVE-2023-1132 2023-05-18 2024-11-21 5.3 - -
CVE-2023-2481 2023-05-18 2024-11-21 5.3 - -
CVE-2023-32096 2023-05-18 2024-11-21 3.1 - -
CVE-2023-32097 2023-05-18 2024-11-21 3.1 - -
CVE-2023-32098 2023-05-18 2024-11-21 5.3 - -
CVE-2023-32099 2023-05-18 2024-11-21 5.3 - -
CVE-2023-32100 2023-05-18 2024-11-21 5.3 - -
CVE-2023-2687 2023-06-02 2024-11-21 2.9 - -
CVE-2023-2686 2023-06-15 2024-11-21 9.8 - -
CVE-2023-2683 2023-06-15 2024-11-21 5.3 - -
CVE-2023-2747 2023-06-15 2024-11-21 3.1 - -
CVE-2023-0969 2023-06-21 2024-11-21 3.5 - -
CVE-2023-0970 2023-06-21 2024-11-21 7.1 - -
CVE-2023-0971 2023-06-21 2024-11-21 9.6 - -
CVE-2023-0972 2023-06-21 2024-11-21 9.6 - -
CVE-2023-3110 2023-06-21 2024-11-21 9.6 - -
CVE-2023-3488 2023-07-28 2024-11-21 3.8 - -
CVE-2023-4041 2023-08-23 2024-11-21 9.8 - -
CVE-2023-3024 2023-09-29 2024-11-21 5.9 - -
CVE-2023-41094 2023-10-04 2024-11-21 10.0 - -
CVE-2020-27630 2023-10-10 2024-11-21 9.8 - -
CVE-2023-3487 2023-10-20 2024-11-21 7.7 - -
CVE-2023-41095 2023-10-26 2024-11-21 6.8 - -
CVE-2023-41096 2023-10-26 2024-11-21 6.8 - -
CVE-2023-24585 2023-11-14 2024-11-21 7.7 - -
CVE-2023-25181 2023-11-14 2024-11-21 9.0 - -
CVE-2023-27882 2023-11-14 2025-11-04 9.0 - -
CVE-2023-28379 2023-11-14 2025-11-04 9.0 - -
CVE-2023-28391 2023-11-14 2025-11-04 9.0 - -
CVE-2023-31247 2023-11-14 2025-11-04 9.0 - -
CVE-2023-4489 2023-12-14 2024-11-21 6.4 - -
CVE-2023-5310 2023-12-15 2024-11-21 5.7 - -
CVE-2023-4020 2023-12-15 2024-11-21 9.0 - -
CVE-2023-41097 2023-12-21 2024-11-21 4.6 - -
CVE-2023-4280 2024-01-02 2024-11-21 9.3 - -
CVE-2023-5138 2024-01-03 2024-11-21 6.8 - -
CVE-2023-6387 2024-02-02 2024-11-21 7.5 - -
CVE-2023-6874 2024-02-05 2024-11-21 7.5 - -
CVE-2024-0240 2024-02-15 2025-02-05 6.5 - -
CVE-2023-45318 2024-02-20 2025-11-04 10.0 - -
CVE-2024-22473 2024-02-21 2025-02-12 6.8 - -
CVE-2023-6533 2024-02-21 2025-02-12 6.5 - -
CVE-2023-6640 2024-02-21 2025-02-12 6.5 - -
CVE-2023-51392 2024-02-23 2025-02-12 6.2 - -
CVE-2023-51393 2024-02-23 2025-02-12 5.3 - -
CVE-2023-51394 2024-02-23 2025-02-12 5.3 - -
CVE-2023-41093 2024-07-12 2025-09-25 3.1 - -
CVE-2024-23938 2024-09-28 2024-10-03 8.8 - -
CVE-2024-50920 2024-12-10 2025-07-01 8.8 - -
CVE-2024-50921 2024-12-10 2025-07-01 6.5 - -
CVE-2024-50924 2024-12-10 2025-07-01 6.5 - -
CVE-2024-50928 2024-12-10 2025-07-01 6.5 - -
CVE-2024-50929 2024-12-10 2025-07-01 6.2 - -
CVE-2024-50930 2024-12-10 2025-07-01 8.8 - -
CVE-2024-50931 2024-12-10 2025-07-01 4.6 - -
CVE-2024-23937 2025-01-31 2025-07-01 4.3 - -
CVE-2024-23973 2025-01-31 2025-09-30 8.8 - -
CVE-2024-24731 2025-01-31 2025-09-30 7.5 - -
CVE-2025-2837 2025-03-26 2025-08-08 8.8 - -
CVE-2025-2838 2025-03-26 2025-08-08 6.5 - -
CVE-2025-12131 2026-02-05 2026-02-12 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for silabs by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with silabs's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.