Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
telepresence_video_communication_server Vendor: cisco

About This Product

telepresence_video_communication_server is a software product developed by cisco, a major technology provider with a global presence in enterprise and consumer markets. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 44 known vulnerabilities affecting cisco telepresence_video_communication_server. This includes 6 critical-severity issues and 14 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2012 to 2024, indicating a sustained research interest and ongoing security attention. 24 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-0330 2012-03-01 2025-04-11 - 7.8 Likely
CVE-2012-0331 2012-03-01 2025-04-11 - 7.5 Likely
CVE-2012-5444 2013-01-17 2025-04-11 - 5.0 Likely
CVE-2014-0675 2014-01-23 2025-04-11 - 6.4 Likely
CVE-2015-0579 2015-01-14 2025-04-12 - 5.0 Likely
CVE-2015-0752 2015-05-29 2025-04-12 - 4.3 Likely
CVE-2016-1400 2016-05-25 2025-04-12 7.5 5.0 Likely
CVE-2016-1444 2016-07-07 2025-04-12 6.5 5.8 Likely
CVE-2016-1468 2016-08-08 2025-04-12 8.8 6.5 Likely
CVE-2017-3790 2017-02-01 2025-04-20 8.6 7.8 Likely
CVE-2017-6790 2017-08-17 2025-04-20 6.8 7.1 Likely
CVE-2017-12287 2017-10-19 2025-04-20 4.3 4.0 Likely
CVE-2018-0358 2018-06-21 2024-11-21 7.5 5.0 Likely
CVE-2018-5390 2018-08-06 2024-11-21 7.5 7.8 Likely
CVE-2018-0409 2018-08-15 2024-11-21 7.5 5.0 Likely
CVE-2018-15430 2018-10-05 2024-11-21 7.2 6.5 Likely
CVE-2019-1679 2019-02-07 2024-11-21 5.0 4.0 Likely
CVE-2019-1720 2019-04-18 2024-11-21 6.8 6.8 Likely
CVE-2019-1721 2019-04-18 2024-11-21 6.5 6.8 Likely
CVE-2019-1722 2019-04-18 2024-11-21 6.5 4.3 Likely
CVE-2019-1854 2019-05-03 2024-11-21 4.1 4.0 Likely
CVE-2019-1845 2019-06-05 2024-11-21 8.6 5.0 Likely
CVE-2019-1872 2019-06-05 2024-11-21 5.3 5.0 Likely
CVE-2019-12705 2019-10-16 2024-11-21 6.1 4.3 Likely
CVE-2011-2538 2019-10-29 2024-11-21 7.2 9.0 Likely
CVE-2020-3596 2020-10-08 2024-11-21 5.9 7.8 Likely
CVE-2020-3482 2020-11-18 2024-11-21 6.5 6.4 Likely
CVE-2021-34715 2021-08-18 2024-11-21 4.7 9.0 Likely
CVE-2021-34716 2021-08-18 2024-11-21 6.7 9.0 Likely
CVE-2022-20754 2022-04-06 2024-11-21 9.0 9.0 Likely
CVE-2022-20755 2022-04-06 2024-11-21 9.0 9.0 Likely
CVE-2022-20809 2022-05-26 2024-11-21 4.3 3.5 Unknown
CVE-2022-20806 2022-05-27 2024-11-21 4.3 5.5 Likely
CVE-2022-20807 2022-05-27 2024-11-21 4.3 4.0 Likely
CVE-2022-20812 2022-07-06 2024-11-21 9.0 8.5 Likely
CVE-2022-20813 2022-07-06 2024-11-21 9.0 4.3 Likely
CVE-2023-20105 2023-06-28 2024-11-21 9.6 - -
CVE-2023-20192 2023-06-28 2024-11-21 9.6 - -
CVE-2023-20209 2023-08-16 2024-11-21 6.5 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2024-20400 2024-07-17 2025-07-31 4.7 - -
CVE-2024-20492 2024-10-02 2024-10-08 6.0 - -
CVE-2022-20814 2024-11-15 2025-07-31 7.4 - -
CVE-2022-20853 2024-11-15 2025-07-31 7.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for cisco telepresence_video_communication_server by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.