Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
identity_services_engine Vendor: cisco

About This Product

identity_services_engine is a software product developed by cisco, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 167 known vulnerabilities affecting cisco identity_services_engine. This includes 8 critical-severity issues and 19 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2011 to 2026, indicating a sustained research interest and ongoing security attention. 137 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-3290 2011-09-21 2025-04-11 - 10.0 Likely
CVE-2012-3908 2012-09-16 2025-04-11 - 6.8 Likely
CVE-2013-3420 2013-07-18 2025-04-11 - 6.8 Likely
CVE-2013-3445 2013-07-29 2025-04-11 - 5.0 Likely
CVE-2013-5538 2013-10-16 2025-04-11 - 5.0 Likely
CVE-2013-5539 2013-10-16 2025-04-11 - 6.0 Unknown
CVE-2013-5540 2013-10-16 2025-04-11 - 6.8 Likely
CVE-2013-5541 2013-10-16 2025-04-11 - 3.5 Unknown
CVE-2014-0680 2014-01-29 2025-04-11 - 4.3 Likely
CVE-2016-1402 2016-05-21 2025-04-12 7.5 5.0 Likely
CVE-2016-6453 2016-11-03 2025-04-12 7.3 4.9 Unknown
CVE-2016-9198 2016-12-14 2025-04-12 7.5 5.0 Likely
CVE-2017-6653 2017-05-22 2025-04-20 7.5 5.0 Likely
CVE-2017-6605 2017-07-04 2025-04-20 5.4 3.5 Unknown
CVE-2017-6701 2017-07-04 2025-04-20 6.1 4.3 Likely
CVE-2017-6733 2017-07-10 2025-04-20 6.1 4.3 Likely
CVE-2017-6734 2017-07-10 2025-04-20 5.4 3.5 Unknown
CVE-2017-6747 2017-08-07 2025-04-20 9.8 7.5 Likely
CVE-2017-12261 2017-11-02 2025-04-20 7.8 7.2 Unknown
CVE-2018-0091 2018-01-18 2024-11-21 6.1 4.3 Likely
CVE-2018-0211 2018-03-08 2024-11-21 4.4 4.9 Unknown
CVE-2018-0212 2018-03-08 2024-11-21 6.1 4.3 Likely
CVE-2018-0213 2018-03-08 2024-11-21 8.8 6.5 Likely
CVE-2018-0214 2018-03-08 2024-11-21 5.3 4.6 Unknown
CVE-2018-0215 2018-03-08 2024-11-21 6.3 6.8 Likely
CVE-2018-0216 2018-03-08 2024-11-21 5.4 5.8 Likely
CVE-2018-0221 2018-03-08 2024-11-21 6.7 7.2 Unknown
CVE-2018-0275 2018-04-19 2024-11-21 6.7 7.2 Unknown
CVE-2018-0277 2018-05-17 2024-11-21 8.6 5.0 Likely
CVE-2018-0327 2018-05-17 2024-11-21 6.1 4.3 Likely
CVE-2018-15424 2018-10-05 2024-11-21 4.7 6.5 Likely
CVE-2018-15425 2018-10-05 2024-11-21 4.7 6.5 Likely
CVE-2018-15456 2019-01-10 2024-11-21 4.3 4.0 Likely
CVE-2018-0187 2019-01-23 2024-11-21 6.5 4.0 Likely
CVE-2018-15455 2019-01-23 2024-11-21 6.1 4.3 Likely
CVE-2018-15459 2019-01-23 2024-11-21 6.5 6.5 Likely
CVE-2019-1673 2019-02-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-1718 2019-04-17 2024-11-21 7.5 7.8 Likely
CVE-2019-1719 2019-04-18 2024-11-21 6.1 3.5 Unknown
CVE-2019-1851 2019-05-16 2024-11-21 6.8 4.0 Likely
CVE-2019-1941 2019-07-17 2024-11-21 6.1 4.3 Likely
CVE-2019-1942 2019-07-17 2024-11-21 4.3 4.0 Likely
CVE-2019-12644 2019-09-05 2024-11-21 6.1 4.3 Likely
CVE-2019-12631 2019-10-02 2024-11-21 6.1 4.3 Likely
CVE-2019-12637 2019-10-16 2024-11-21 5.4 3.5 Unknown
CVE-2019-12638 2019-10-16 2024-11-21 5.4 3.5 Unknown
CVE-2019-15255 2020-01-26 2024-11-21 6.5 4.0 Likely
CVE-2020-3149 2020-02-05 2024-11-21 4.8 3.5 Unknown
CVE-2020-3156 2020-02-19 2024-11-21 6.1 4.3 Likely
CVE-2020-3157 2020-03-04 2024-11-21 5.4 3.5 Unknown
CVE-2020-3353 2020-06-03 2024-11-21 5.9 4.3 Likely
CVE-2020-3340 2020-07-02 2024-11-21 4.8 3.5 Unknown
CVE-2019-1736 2020-09-23 2024-11-21 6.6 6.9 Unknown
CVE-2020-3467 2020-10-08 2024-11-21 7.7 5.5 Likely
CVE-2020-3589 2020-10-08 2024-11-21 4.8 3.5 Unknown
CVE-2020-26083 2020-11-06 2024-11-21 4.8 3.5 Unknown
CVE-2020-27122 2020-11-06 2024-11-21 6.7 7.2 Unknown
CVE-2020-3551 2020-11-06 2024-11-21 6.1 4.3 Likely
CVE-2021-1412 2021-02-17 2024-11-21 6.5 4.0 Likely
CVE-2021-1416 2021-02-17 2024-11-21 6.5 4.0 Likely
CVE-2021-1306 2021-05-22 2024-11-21 4.4 3.6 Unknown
CVE-2021-1603 2021-07-08 2024-11-21 4.8 3.5 Unknown
CVE-2021-1604 2021-07-08 2024-11-21 4.8 3.5 Unknown
CVE-2021-1605 2021-07-08 2024-11-21 4.8 3.5 Unknown
CVE-2021-1606 2021-07-08 2024-11-21 4.8 3.5 Unknown
CVE-2021-1607 2021-07-08 2024-11-21 4.8 3.5 Unknown
CVE-2021-34759 2021-09-02 2024-11-21 4.8 3.5 Unknown
CVE-2021-1594 2021-10-06 2024-11-21 7.5 9.3 Likely
CVE-2021-34702 2021-10-06 2024-11-21 4.3 4.0 Likely
CVE-2021-34706 2021-10-06 2024-11-21 6.4 5.5 Likely
CVE-2021-34738 2021-10-21 2024-11-21 6.1 4.3 Likely
CVE-2021-40121 2021-10-21 2024-11-21 6.1 3.5 Unknown
CVE-2021-40123 2021-10-21 2024-11-21 4.3 4.0 Likely
CVE-2021-44228 2021-12-10 2026-02-20 10.0 9.3 Likely
CVE-2022-20756 2022-04-06 2024-11-21 8.6 5.0 Likely
CVE-2022-20782 2022-04-06 2024-11-21 6.5 4.0 Likely
CVE-2022-20733 2022-06-15 2024-11-21 5.3 5.0 Likely
CVE-2022-20819 2022-06-15 2024-11-21 6.5 4.0 Likely
CVE-2022-20914 2022-08-10 2024-11-21 4.9 - -
CVE-2022-20822 2022-10-26 2024-11-21 7.1 - -
CVE-2022-20959 2022-10-26 2024-11-21 6.1 - -
CVE-2022-20937 2022-11-04 2024-11-21 5.3 - -
CVE-2022-20956 2022-11-04 2024-11-21 7.1 - -
CVE-2022-20961 2022-11-04 2024-11-21 8.8 - -
CVE-2022-20962 2022-11-04 2024-11-21 3.8 - -
CVE-2022-20963 2022-11-04 2024-11-21 5.4 - -
CVE-2022-20964 2023-01-20 2024-11-21 6.3 - -
CVE-2022-20965 2023-01-20 2024-11-21 4.3 - -
CVE-2022-20966 2023-01-20 2024-11-21 5.4 - -
CVE-2022-20967 2023-01-20 2024-11-21 4.8 - -
CVE-2023-20085 2023-03-01 2024-11-21 6.1 - -
CVE-2023-20021 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20022 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20023 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20030 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20152 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20121 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20122 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20153 2023-04-05 2024-11-21 6.0 - -
CVE-2023-20077 2023-05-18 2024-11-21 4.9 - -
CVE-2023-20087 2023-05-18 2024-11-21 4.9 - -
CVE-2023-20106 2023-05-18 2024-11-21 5.4 - -
CVE-2023-20163 2023-05-18 2024-11-21 6.5 - -
CVE-2023-20164 2023-05-18 2024-11-21 6.5 - -
CVE-2023-20166 2023-05-18 2024-11-21 6.0 - -
CVE-2023-20167 2023-05-18 2024-11-21 6.0 - -
CVE-2023-20171 2023-05-18 2024-11-21 5.4 - -
CVE-2023-20172 2023-05-18 2024-11-21 5.4 - -
CVE-2023-20173 2023-05-18 2024-11-21 4.9 - -
CVE-2023-20174 2023-05-18 2024-11-21 4.9 - -
CVE-2023-20111 2023-08-16 2024-11-21 6.5 - -
CVE-2023-20243 2023-09-06 2024-11-21 8.6 - -
CVE-2023-20193 2023-09-07 2024-11-21 6.0 - -
CVE-2023-20194 2023-09-07 2024-11-21 4.9 - -
CVE-2023-20195 2023-11-01 2024-11-21 4.7 - -
CVE-2023-20213 2023-11-01 2024-11-21 4.3 - -
CVE-2023-20170 2023-11-01 2024-11-21 6.0 - -
CVE-2023-20175 2023-11-01 2024-11-21 8.8 - -
CVE-2023-20196 2023-11-01 2024-11-21 4.7 - -
CVE-2023-20208 2023-11-21 2024-11-21 4.8 - -
CVE-2023-20272 2023-11-21 2024-11-21 6.7 - -
CVE-2024-20251 2024-01-17 2024-11-21 4.8 - -
CVE-2024-20332 2024-04-03 2025-09-30 5.5 - -
CVE-2024-20368 2024-04-03 2025-04-28 6.5 - -
CVE-2024-20296 2024-07-17 2025-04-07 4.7 - -
CVE-2024-20443 2024-08-07 2025-10-02 5.4 - -
CVE-2024-20479 2024-08-07 2024-08-23 4.8 - -
CVE-2024-20417 2024-08-21 2025-03-31 6.5 - -
CVE-2024-20466 2024-08-21 2025-03-31 6.5 - -
CVE-2024-20486 2024-08-21 2025-03-31 6.5 - -
CVE-2024-20469 2024-09-04 2025-09-25 6.0 - -
CVE-2024-20515 2024-10-02 2025-08-05 6.5 - -
CVE-2024-20476 2024-11-06 2025-04-04 4.3 - -
CVE-2024-20487 2024-11-06 2025-04-28 4.3 - -
CVE-2024-20525 2024-11-06 2024-11-20 6.1 - -
CVE-2024-20527 2024-11-06 2025-04-28 5.5 - -
CVE-2024-20528 2024-11-06 2025-04-28 3.8 - -
CVE-2024-20529 2024-11-06 2025-04-28 5.5 - -
CVE-2024-20530 2024-11-06 2024-11-20 6.1 - -
CVE-2024-20531 2024-11-06 2024-11-20 5.5 - -
CVE-2024-20532 2024-11-06 2025-04-28 5.5 - -
CVE-2024-20537 2024-11-06 2024-11-22 6.5 - -
CVE-2024-20538 2024-11-06 2024-11-20 6.1 - -
CVE-2024-20539 2024-11-06 2024-11-22 4.8 - -
CVE-2020-3525 2024-11-18 2025-06-24 4.3 - -
CVE-2025-20124 2025-02-05 2025-03-28 9.9 - -
CVE-2025-20125 2025-02-05 2025-03-28 9.1 - -
CVE-2025-20204 2025-02-05 2025-03-28 4.8 - -
CVE-2025-20205 2025-02-05 2025-03-28 4.8 - -
CVE-2025-20152 2025-05-21 2025-07-11 8.6 - -
CVE-2025-20267 2025-05-21 2025-07-22 4.8 - -
CVE-2025-20130 2025-06-04 2025-07-22 4.9 - -
CVE-2025-20286 2025-06-04 2025-10-15 9.9 - -
CVE-2025-20264 2025-06-25 2025-07-08 6.4 - -
CVE-2025-20281 2025-06-25 2025-10-28 10.0 - -
CVE-2025-20282 2025-06-25 2025-06-26 10.0 - -
CVE-2025-20283 2025-07-16 2025-07-22 6.5 - -
CVE-2025-20284 2025-07-16 2025-07-22 6.5 - -
CVE-2025-20285 2025-07-16 2025-07-22 4.1 - -
CVE-2025-20337 2025-07-16 2025-10-28 10.0 - -
CVE-2025-20289 2025-11-05 2025-11-19 4.8 - -
CVE-2025-20303 2025-11-05 2025-11-19 5.4 - -
CVE-2025-20304 2025-11-05 2025-11-19 5.4 - -
CVE-2025-20305 2025-11-05 2025-11-19 4.3 - -
CVE-2025-20343 2025-11-05 2025-11-19 8.6 - -
CVE-2026-20047 2026-01-15 2026-01-30 4.8 - -
CVE-2026-20076 2026-01-15 2026-01-30 4.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for cisco identity_services_engine by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.