microchip CVE Vulnerabilities & Metrics

Focus on microchip vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About microchip Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with microchip. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total microchip CVEs: 33
Earliest CVE date: 11 May 2009, 20:00 UTC
Latest CVE date: 09 Jan 2024, 10:15 UTC

Latest CVE reference: CVE-2023-51438

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical microchip CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.35

Max CVSS: 9.3

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 15
4.0-6.9 18
7.0-8.9 0
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS microchip CVEs

These are the five CVEs with the highest CVSS scores for microchip, sorted by severity first and recency.

All CVEs for microchip

CVE-2023-51438 microchip vulnerability CVSS: 0 09 Jan 2024, 10:15 UTC

A vulnerability has been identified in SIMATIC IPC1047E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC647E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC847E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows). In default installations of maxView Storage Manager where Redfish® server is configured for remote system management, a vulnerability has been identified that can provide unauthorized access.

CVE-2024-22216 microchip vulnerability CVSS: 0 08 Jan 2024, 07:15 UTC

In default installations of Microchip maxView Storage Manager (for Adaptec Smart Storage Controllers) where Redfish server is configured for remote system management, unauthorized access can occur, with data modification and information disclosure. This affects 3.00.23484 through 4.14.00.26064 (except for the patched versions 3.07.23980 and 4.07.00.25339).

CVE-2020-27636 microchip vulnerability CVSS: 0 10 Oct 2023, 17:15 UTC

In Microchip MPLAB Net 3.6.1, TCP ISNs are improperly random.

CVE-2023-23588 microchip vulnerability CVSS: 0 11 Apr 2023, 10:15 UTC

A vulnerability has been identified in SIMATIC IPC1047 (All versions), SIMATIC IPC1047E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC647D (All versions), SIMATIC IPC647E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC847D (All versions), SIMATIC IPC847E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows). The Adaptec Maxview application on affected devices is using a non-unique TLS certificate across installations to protect the communication from the local browser to the local application. A local attacker may use this key to decrypt intercepted local traffic between the browser and the application and could perform a man-in-the-middle attack in order to modify data in transit.

CVE-2022-40022 microchip vulnerability CVSS: 0 13 Feb 2023, 15:15 UTC

Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.

CVE-2022-45192 microchip vulnerability CVSS: 0 08 Feb 2023, 00:15 UTC

An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a cleartext encryption pause request.

CVE-2022-45191 microchip vulnerability CVSS: 0 08 Feb 2023, 00:15 UTC

An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a pair confirm message with wrong values.

CVE-2022-45190 microchip vulnerability CVSS: 0 08 Feb 2023, 00:15 UTC

An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can bypass passkey entry in the legacy pairing of the device.

CVE-2022-40480 microchip vulnerability CVSS: 0 08 Feb 2023, 00:15 UTC

Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain an issue which allows attackers to cause a Denial of Service (DoS) via a crafted ConReq packet.

CVE-2022-46403 microchip vulnerability CVSS: 0 19 Dec 2022, 23:15 UTC

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages.

CVE-2022-46402 microchip vulnerability CVSS: 0 19 Dec 2022, 23:15 UTC

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PairCon_rmSend with incorrect values.

CVE-2022-46401 microchip vulnerability CVSS: 0 19 Dec 2022, 23:15 UTC

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.

CVE-2022-46400 microchip vulnerability CVSS: 0 19 Dec 2022, 23:15 UTC

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.

CVE-2022-46399 microchip vulnerability CVSS: 0 19 Dec 2022, 23:15 UTC

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) is unresponsive with ConReqTimeoutZero.

CVE-2021-37605 microchip vulnerability CVSS: 5.0 05 Aug 2021, 16:15 UTC

In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.

CVE-2021-37604 microchip vulnerability CVSS: 5.0 05 Aug 2021, 16:15 UTC

In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.

CVE-2020-20950 microchip vulnerability CVSS: 4.3 19 Jan 2021, 13:15 UTC

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.

CVE-2020-17441 microchip vulnerability CVSS: 6.4 11 Dec 2020, 23:15 UTC

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).

CVE-2019-16128 microchip vulnerability CVSS: 4.6 22 Oct 2020, 20:15 UTC

Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 1 of 2).

CVE-2019-16129 microchip vulnerability CVSS: 4.6 22 Oct 2020, 19:15 UTC

Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 2 of 2).

CVE-2019-16127 microchip vulnerability CVSS: 6.4 22 Oct 2020, 19:15 UTC

Atmel Advanced Software Framework (ASF) 4 has an Integer Overflow.

CVE-2020-12789 microchip vulnerability CVSS: 4.3 14 Sep 2020, 14:15 UTC

The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets.

CVE-2020-12788 microchip vulnerability CVSS: 5.0 14 Sep 2020, 14:15 UTC

CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks.

CVE-2020-12787 microchip vulnerability CVSS: 4.3 14 Sep 2020, 14:15 UTC

Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.

CVE-2020-9033 microchip vulnerability CVSS: 6.4 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php.

CVE-2020-9032 microchip vulnerability CVSS: 6.4 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to kernlog.php.

CVE-2020-9031 microchip vulnerability CVSS: 6.4 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to daemonlog.php.

CVE-2020-9030 microchip vulnerability CVSS: 6.4 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to the syslog.php.

CVE-2020-9029 microchip vulnerability CVSS: 6.4 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to messagelog.php.

CVE-2020-9028 microchip vulnerability CVSS: 4.3 17 Feb 2020, 04:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow stored XSS via the newUserName parameter on the "User Creation, Deletion and Password Maintenance" screen (when creating a new user).

CVE-2020-9034 microchip vulnerability CVSS: 5.0 17 Feb 2020, 03:15 UTC

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.

CVE-2019-19195 microchip vulnerability CVSS: 6.1 10 Feb 2020, 21:51 UTC

The Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices does not properly restrict link-layer data length on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.

CVE-2019-15809 microchip vulnerability CVSS: 1.2 03 Oct 2019, 14:15 UTC

Smart cards from the Athena SCS manufacturer, based on the Atmel Toolbox 00.03.11.05 and the AT90SC chip, contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because the Atmel Toolbox 00.03.11.05 contains two versions of ECDSA signature functions, described as fast and secure, but the affected cards chose to use the fast version, which leaks the bit length of the random nonce via timing. This affects Athena IDProtect 010b.0352.0005, Athena IDProtect 010e.1245.0002, Athena IDProtect 0106.0130.0401, Athena IDProtect 010e.1245.0002, Valid S/A IDflex V 010b.0352.0005, SafeNet eToken 4300 010e.1245.0002, TecSec Armored Card 010e.0264.0001, and TecSec Armored Card 108.0264.0001.

CVE-2009-1674 microchip vulnerability CVSS: 9.3 18 May 2009, 18:30 UTC

Stack-based buffer overflow in Microchip MPLAB IDE 8.30 allows user-assisted remote attackers to execute arbitrary code via a long .cof pathname in a [TOOL_SETTINGS] section in a .mcp file, possibly a related issue to CVE-2009-1608.

CVE-2009-1608 microchip vulnerability CVSS: 9.3 11 May 2009, 20:00 UTC

Multiple buffer overflows in Microchip MPLAB IDE 8.30 and possibly earlier versions allow user-assisted remote attackers to execute arbitrary code via a .MCP project file with long (1) FILE_INFO, (2) CAT_FILTERS, and possibly other fields.