Complete end-of-life dates, support windows, and security status for all Cfengine versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.
| Version | Latest Release | Release Date | EOL Date | Days | Status |
|---|---|---|---|---|---|
| 3.15 LTS | 3.15.7 | Dec 19, 2019 | Dec 31, 2022 | 1225 days past EOL | EOL |
| 3.16 | 3.16.0 | Jun 23, 2020 | Nov 19, 2020 | 1997 days past EOL | EOL |
| 3.17 | 3.17.0 | Nov 19, 2020 | Jun 24, 2021 | 1780 days past EOL | EOL |
| 3.18 LTS | 3.18.8 | Jun 24, 2021 | Aug 31, 2024 | 616 days past EOL | EOL |
| 3.19 | 3.19.0 | Dec 10, 2021 | Jul 1, 2022 | 1408 days past EOL | EOL |
| 3.20 | 3.20.0 | Jul 1, 2022 | Dec 21, 2022 | 1235 days past EOL | EOL |
| 3.21 LTS | 3.21.8 | Dec 21, 2022 | Dec 31, 2025 | 129 days past EOL | EOL |
| 3.22 | 3.22.0 | Jun 16, 2023 | Dec 5, 2023 | 886 days past EOL | EOL |
| 3.23 | 3.23.0 | Dec 5, 2023 | Jul 22, 2024 | 656 days past EOL | EOL |
| 3.24 LTS | 3.24.4 | Jul 22, 2024 | Jul 31, 2027 | 448 days remaining | Active |
| 3.25 | 3.25.0 | Jan 6, 2025 | May 20, 2025 | 354 days past EOL | EOL |
| 3.26 | 3.26.0 | May 20, 2025 | Jan 9, 2026 | 120 days past EOL | EOL |
| 3.27 LTS | 3.27.1 | Jan 9, 2026 | Already EOL | Supported | Active |
When a Cfengine version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.
The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.
Organizations running EOL Cfengine should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.
Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.
Open Stack Scanner →