Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

zephyrproject

About This Vendor

zephyrproject is a technology vendor producing software and infrastructure products. As a software provider, zephyrproject's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of zephyrproject's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 119 known vulnerabilities from zephyrproject. This includes 14 critical-severity issues and 55 high-severity issues that represent significant risk. These vulnerabilities affect 52 distinct products across zephyrproject's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying zephyrproject products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-1000800 2018-09-06 2024-11-21 9.8 7.5 Likely
CVE-2017-14199 2019-04-12 2024-11-21 9.8 7.5 Likely
CVE-2017-14201 2019-08-29 2024-11-21 7.8 4.6 Unknown
CVE-2017-14202 2019-08-29 2024-11-21 7.8 4.6 Unknown
CVE-2020-10019 2020-05-11 2024-11-21 8.1 4.6 Unknown
CVE-2020-10021 2020-05-11 2024-11-21 8.1 4.6 Unknown
CVE-2020-10022 2020-05-11 2024-11-21 9.0 7.5 Likely
CVE-2020-10023 2020-05-11 2024-11-21 6.9 4.6 Unknown
CVE-2020-10024 2020-05-11 2024-11-21 7.8 7.2 Unknown
CVE-2020-10027 2020-05-11 2024-11-21 7.8 7.2 Unknown
CVE-2020-10028 2020-05-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-10058 2020-05-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-10059 2020-05-11 2024-11-21 4.8 5.8 Likely
CVE-2020-10060 2020-05-11 2024-11-21 8.0 5.5 Likely
CVE-2020-10067 2020-05-11 2024-11-21 7.5 7.2 Unknown
CVE-2020-10061 2020-06-05 2024-11-21 8.1 5.8 Unknown
CVE-2020-10062 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10063 2020-06-05 2024-11-21 6.8 5.0 Likely
CVE-2020-10068 2020-06-05 2024-11-21 5.1 3.3 Unknown
CVE-2020-10070 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10071 2020-06-05 2024-11-21 9.0 7.5 Likely
CVE-2020-10064 2021-05-25 2024-11-21 8.3 7.5 Likely
CVE-2020-10065 2021-05-25 2024-11-21 3.8 5.8 Unknown
CVE-2020-10066 2021-05-25 2024-11-21 2.5 3.3 Unknown
CVE-2020-10069 2021-05-25 2024-11-21 4.3 3.3 Unknown
CVE-2020-10072 2021-05-25 2024-11-21 5.9 4.6 Unknown
CVE-2020-13598 2021-05-25 2024-11-21 6.3 4.6 Unknown
CVE-2020-13599 2021-05-25 2024-11-21 3.3 2.1 Unknown
CVE-2020-13600 2021-05-25 2024-11-21 7.0 7.2 Unknown
CVE-2020-13601 2021-05-25 2024-11-21 9.0 7.5 Likely
CVE-2020-13602 2021-05-25 2024-11-21 4.0 2.1 Unknown
CVE-2020-13603 2021-05-25 2024-11-21 6.9 4.6 Unknown
CVE-2021-3320 2021-05-25 2024-11-21 5.9 5.0 Likely
CVE-2021-3319 2021-10-05 2024-11-21 6.5 7.5 Likely
CVE-2021-3436 2021-10-05 2024-11-21 4.3 6.4 Likely
CVE-2021-3510 2021-10-05 2024-11-21 7.5 5.0 Likely
CVE-2021-3581 2021-10-05 2024-11-21 7.0 5.8 Unknown
CVE-2021-3625 2021-10-05 2024-11-21 9.6 7.5 Likely
CVE-2021-3321 2021-10-12 2024-11-21 7.5 5.8 Unknown
CVE-2021-3322 2021-10-12 2024-11-21 6.5 3.3 Unknown
CVE-2021-3323 2021-10-12 2024-11-21 8.3 7.5 Likely
CVE-2021-3330 2021-10-12 2024-11-21 7.1 5.8 Unknown
CVE-2021-3454 2021-10-19 2024-11-21 4.3 5.0 Likely
CVE-2021-3455 2021-10-19 2024-11-21 4.3 5.0 Likely
CVE-2021-3835 2022-02-07 2024-11-21 8.2 5.8 Unknown
CVE-2021-3861 2022-02-07 2024-11-21 8.2 7.2 Unknown
CVE-2021-3430 2022-06-28 2024-11-21 6.5 5.0 Likely
CVE-2021-3431 2022-06-28 2024-11-21 4.3 5.0 Likely
CVE-2021-3432 2022-06-28 2024-11-21 4.3 5.0 Likely
CVE-2021-3433 2022-06-28 2024-11-21 4.0 2.1 Unknown
CVE-2021-3434 2022-06-28 2024-11-21 4.9 4.6 Unknown
CVE-2021-3435 2022-06-28 2024-11-21 4.0 2.1 Unknown
CVE-2022-1041 2022-07-26 2024-11-21 8.2 - -
CVE-2022-1042 2022-07-26 2024-11-21 8.2 - -
CVE-2022-1841 2022-08-31 2024-11-21 7.2 - -
CVE-2022-2741 2022-10-31 2024-11-21 8.2 - -
CVE-2022-2993 2022-12-09 2025-04-22 8.6 - -
CVE-2022-0553 2023-01-11 2024-11-21 6.5 - -
CVE-2021-3966 2023-01-11 2024-11-21 9.6 - -
CVE-2023-0397 2023-01-19 2024-11-21 9.6 - -
CVE-2022-3806 2023-01-25 2025-04-03 9.8 - -
CVE-2023-0396 2023-01-25 2025-04-03 6.8 - -
CVE-2021-3329 2023-02-26 2024-11-21 9.6 - -
CVE-2023-0779 2023-05-30 2024-11-21 6.7 - -
CVE-2023-0359 2023-07-10 2024-11-21 5.9 - -
CVE-2023-1901 2023-07-10 2024-11-21 5.9 - -
CVE-2023-1902 2023-07-10 2024-11-21 5.9 - -
CVE-2023-2234 2023-07-10 2024-11-21 6.8 - -
CVE-2023-4265 2023-08-12 2024-11-21 6.4 - -
CVE-2023-4258 2023-09-25 2024-11-21 8.6 - -
CVE-2023-4259 2023-09-26 2024-11-21 7.1 - -
CVE-2023-4260 2023-09-27 2025-02-13 6.3 - -
CVE-2023-4264 2023-09-27 2025-02-13 7.1 - -
CVE-2023-5184 2023-09-27 2025-02-13 7.0 - -
CVE-2023-3725 2023-10-06 2024-11-21 7.6 - -
CVE-2023-5563 2023-10-13 2024-11-21 7.1 - -
CVE-2023-4263 2023-10-13 2024-11-21 7.6 - -
CVE-2023-4257 2023-10-13 2024-11-21 7.6 - -
CVE-2023-5753 2023-10-25 2025-02-13 6.3 - -
CVE-2023-5139 2023-10-26 2024-11-21 4.4 - -
CVE-2023-4424 2023-11-21 2024-11-21 8.3 - -
CVE-2023-5055 2023-11-21 2024-11-21 8.3 - -
CVE-2023-6749 2024-02-18 2025-01-22 8.0 - -
CVE-2023-5779 2024-02-18 2025-01-22 4.4 - -
CVE-2023-6249 2024-02-18 2025-01-23 8.0 - -
CVE-2024-1638 2024-02-19 2025-01-17 8.2 - -
CVE-2023-6881 2024-02-29 2025-01-23 7.3 - -
CVE-2023-7060 2024-03-15 2025-03-27 8.6 - -
CVE-2024-3077 2024-03-29 2025-01-23 6.8 - -
CVE-2024-3332 2024-07-03 2025-02-03 6.5 - -
CVE-2024-4785 2024-08-19 2025-09-17 7.6 - -
CVE-2024-5754 2024-09-13 2025-09-17 8.2 - -
CVE-2024-6258 2024-09-13 2025-09-17 6.8 - -
CVE-2024-5931 2024-09-13 2025-09-17 6.3 - -
CVE-2024-6135 2024-09-13 2024-09-19 7.6 - -
CVE-2024-6137 2024-09-13 2025-09-17 7.6 - -
CVE-2024-6259 2024-09-13 2025-09-17 7.6 - -
CVE-2024-6442 2024-10-04 2024-11-13 6.3 - -
CVE-2024-6443 2024-10-04 2024-11-12 6.3 - -
CVE-2024-6444 2024-10-04 2024-11-13 6.3 - -
CVE-2024-11263 2024-11-15 2025-02-03 9.3 - -
CVE-2024-8798 2024-12-16 2025-09-17 7.5 - -
CVE-2024-10395 2025-02-03 2025-10-29 8.6 - -
CVE-2025-1673 2025-02-25 2025-02-28 8.2 - -
CVE-2025-1674 2025-02-25 2025-02-28 8.2 - -
CVE-2025-1675 2025-02-25 2025-03-03 8.2 - -
CVE-2025-2962 2025-06-24 2025-10-30 7.5 - -
CVE-2025-20696 2025-08-04 2025-08-18 6.8 - -
CVE-2025-10456 2025-09-19 2025-10-29 7.1 - -
CVE-2025-10457 2025-09-19 2025-10-29 4.3 - -
CVE-2025-10458 2025-09-19 2025-10-29 7.6 - -
CVE-2025-7403 2025-09-19 2025-10-29 7.6 - -
CVE-2025-20746 2025-11-04 2025-11-05 6.7 - -
CVE-2025-20747 2025-11-04 2025-11-05 6.7 - -
CVE-2026-20435 2026-03-02 2026-03-03 4.6 - -
CVE-2026-1678 2026-03-05 2026-03-09 9.4 - -
CVE-2026-0849 2026-03-16 2026-04-02 3.8 - -
CVE-2026-4179 2026-03-16 2026-04-02 6.1 - -
CVE-2026-1679 2026-03-28 2026-03-31 7.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for zephyrproject by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with zephyrproject's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.