Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
unified_computing_system Vendor: cisco

About This Product

unified_computing_system is a software product developed by cisco, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 110 known vulnerabilities affecting cisco unified_computing_system. This includes 6 critical-severity issues and 30 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2011 to 2024, indicating a sustained research interest and ongoing security attention. 74 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-2569 2011-10-27 2025-04-11 - 6.8 Unknown
CVE-2013-1190 2013-08-02 2025-04-11 - 5.0 Likely
CVE-2012-4072 2013-09-20 2025-04-11 - 4.3 Likely
CVE-2012-4073 2013-09-20 2025-04-11 - 5.8 Likely
CVE-2012-4074 2013-09-20 2025-04-11 - 5.8 Likely
CVE-2012-4083 2013-09-20 2025-04-11 - 4.0 Likely
CVE-2012-4093 2013-09-20 2025-04-11 - 4.6 Unknown
CVE-2012-4081 2013-09-20 2025-04-11 - 4.6 Unknown
CVE-2012-4082 2013-09-20 2025-04-11 - 6.8 Unknown
CVE-2012-4078 2013-09-24 2025-04-11 - 8.5 Unknown
CVE-2012-4085 2013-09-24 2025-04-11 - 5.0 Likely
CVE-2012-4087 2013-09-24 2025-04-11 - 5.1 Unknown
CVE-2012-4089 2013-09-24 2025-04-11 - 6.6 Unknown
CVE-2012-4094 2013-09-24 2025-04-11 - 5.4 Unknown
CVE-2012-4086 2013-09-25 2025-04-11 - 5.1 Unknown
CVE-2012-4079 2013-09-26 2025-04-11 - 5.0 Likely
CVE-2012-4088 2013-09-26 2025-04-11 - 4.3 Unknown
CVE-2012-4092 2013-09-26 2025-04-11 - 5.8 Likely
CVE-2012-1313 2013-09-27 2025-04-11 - 6.5 Unknown
CVE-2012-4096 2013-10-01 2025-04-11 - 6.2 Unknown
CVE-2012-4095 2013-10-02 2025-04-11 - 5.5 Unknown
CVE-2012-4102 2013-10-02 2025-04-11 - 6.8 Unknown
CVE-2012-4103 2013-10-02 2025-04-11 - 6.8 Unknown
CVE-2012-4104 2013-10-02 2025-04-11 - 6.6 Unknown
CVE-2012-4109 2013-10-02 2025-04-11 - 6.8 Unknown
CVE-2012-4110 2013-10-02 2025-04-11 - 6.8 Unknown
CVE-2012-4111 2013-10-02 2025-04-11 - 6.8 Unknown
CVE-2012-4136 2013-10-03 2025-04-11 - 6.8 Likely
CVE-2012-4084 2013-10-05 2025-04-11 - 6.8 Likely
CVE-2012-4105 2013-10-13 2025-04-11 - 4.6 Unknown
CVE-2012-4106 2013-10-13 2025-04-11 - 6.8 Unknown
CVE-2012-4107 2013-10-13 2025-04-11 - 4.6 Unknown
CVE-2012-4108 2013-10-13 2025-04-11 - 6.8 Unknown
CVE-2012-4112 2013-10-19 2025-04-11 - 6.8 Unknown
CVE-2012-4113 2013-10-19 2025-04-11 - 4.6 Unknown
CVE-2012-4114 2013-10-19 2025-04-11 - 5.8 Likely
CVE-2012-4116 2013-10-19 2025-04-11 - 4.3 Likely
CVE-2012-4117 2013-10-19 2025-04-11 - 5.8 Likely
CVE-2012-4115 2013-10-21 2025-04-11 - 5.8 Likely
CVE-2013-5550 2013-10-22 2025-04-11 - 4.6 Unknown
CVE-2014-7996 2014-11-18 2025-04-12 - 6.8 Likely
CVE-2014-8003 2014-12-10 2025-04-12 - 7.2 Unknown
CVE-2014-8009 2014-12-10 2025-04-12 - 5.0 Likely
CVE-2015-0599 2015-02-03 2025-04-12 - 4.3 Likely
CVE-2015-0633 2015-02-26 2025-04-12 - 6.8 Unknown
CVE-2015-4183 2015-06-17 2025-04-12 - 7.2 Unknown
CVE-2015-4259 2015-07-10 2025-04-12 - 4.3 Likely
CVE-2015-4279 2015-07-20 2025-04-12 - 7.2 Unknown
CVE-2015-6355 2015-11-04 2025-04-12 - 5.0 Likely
CVE-2015-6415 2015-12-12 2025-04-12 - 7.1 Likely
CVE-2015-6435 2016-01-22 2025-04-12 9.8 10.0 Likely
CVE-2015-0718 2016-03-03 2025-04-12 7.5 7.8 Likely
CVE-2016-6402 2016-09-18 2025-04-12 7.8 7.2 Unknown
CVE-2017-6597 2017-04-07 2025-04-20 7.8 7.2 Unknown
CVE-2017-6598 2017-04-07 2025-04-20 6.7 7.2 Unknown
CVE-2017-6600 2017-04-07 2025-04-20 7.8 7.2 Unknown
CVE-2017-6601 2017-04-07 2025-04-20 7.1 3.6 Unknown
CVE-2017-6602 2017-04-07 2025-04-20 4.4 3.6 Unknown
CVE-2017-6604 2017-04-07 2025-04-20 6.1 5.8 Likely
CVE-2017-6633 2017-05-22 2025-04-20 7.5 5.0 Likely
CVE-2017-12255 2017-09-21 2025-04-20 6.7 7.2 Unknown
CVE-2017-12329 2017-11-30 2025-04-20 6.3 4.6 Unknown
CVE-2017-12331 2017-11-30 2025-04-20 6.7 7.2 Unknown
CVE-2017-12332 2017-11-30 2025-04-20 4.4 4.9 Unknown
CVE-2017-12333 2017-11-30 2025-04-20 6.7 4.6 Unknown
CVE-2017-12334 2017-11-30 2025-04-20 6.7 7.2 Unknown
CVE-2017-12335 2017-11-30 2025-04-20 6.3 4.6 Unknown
CVE-2017-12336 2017-11-30 2025-04-20 4.2 4.6 Unknown
CVE-2017-12338 2017-11-30 2025-04-20 6.0 2.1 Unknown
CVE-2017-12341 2017-11-30 2025-04-20 6.7 7.2 Unknown
CVE-2018-0338 2018-06-07 2024-11-21 7.8 4.6 Unknown
CVE-2018-0304 2018-06-20 2024-11-21 9.8 10.0 Likely
CVE-2018-0308 2018-06-20 2024-11-21 9.8 7.5 Likely
CVE-2018-0312 2018-06-20 2024-11-21 9.8 7.5 Likely
CVE-2018-0314 2018-06-20 2024-11-21 9.8 7.5 Likely
CVE-2018-0305 2018-06-21 2024-11-21 8.6 5.0 Likely
CVE-2018-0430 2018-10-05 2024-11-21 8.8 9.0 Likely
CVE-2018-0431 2018-10-05 2024-11-21 8.8 9.0 Likely
CVE-2019-1725 2019-04-18 2024-11-21 5.5 3.6 Unknown
CVE-2019-1627 2019-06-20 2024-11-21 6.5 4.0 Likely
CVE-2019-1628 2019-06-20 2024-11-21 5.5 2.1 Unknown
CVE-2019-1629 2019-06-20 2024-11-21 5.3 5.0 Likely
CVE-2019-1630 2019-06-20 2024-11-21 5.5 2.1 Unknown
CVE-2019-1631 2019-06-20 2024-11-21 5.3 5.0 Likely
CVE-2019-1632 2019-06-20 2024-11-21 4.6 6.0 Unknown
CVE-2019-1879 2019-06-20 2024-11-21 6.4 7.2 Unknown
CVE-2019-1634 2019-08-21 2024-11-21 7.2 9.0 Likely
CVE-2019-1850 2019-08-21 2024-11-21 7.2 9.0 Likely
CVE-2019-1863 2019-08-21 2024-11-21 8.1 9.0 Likely
CVE-2019-1864 2019-08-21 2024-11-21 8.8 9.0 Likely
CVE-2019-1865 2019-08-21 2024-11-21 8.8 9.0 Likely
CVE-2019-1871 2019-08-21 2024-11-21 7.2 9.0 Likely
CVE-2019-1883 2019-08-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-1885 2019-08-21 2024-11-21 7.2 9.0 Likely
CVE-2019-1896 2019-08-21 2024-11-21 7.2 9.0 Likely
CVE-2019-1900 2019-08-21 2024-11-21 7.5 7.8 Likely
CVE-2019-1907 2019-08-21 2024-11-21 8.8 6.5 Likely
CVE-2019-1908 2019-08-21 2024-11-21 7.5 5.0 Likely
CVE-2019-1966 2019-08-30 2024-11-21 7.8 7.2 Unknown
CVE-2020-10136 2020-06-02 2025-11-03 5.3 5.0 Likely
CVE-2019-1736 2020-09-23 2024-11-21 6.6 6.9 Unknown
CVE-2021-1368 2021-02-24 2024-11-21 8.8 4.9 Unknown
CVE-2021-1387 2021-02-24 2024-11-21 8.6 4.3 Likely
CVE-2021-1590 2021-08-25 2024-11-21 5.3 4.3 Likely
CVE-2021-1592 2021-08-25 2024-11-21 4.3 4.0 Likely
CVE-2021-34736 2021-10-21 2024-11-21 5.3 5.0 Likely
CVE-2021-44228 2021-12-10 2026-02-20 10.0 9.3 Likely
CVE-2024-20294 2024-02-29 2025-05-21 6.6 - -
CVE-2024-20365 2024-10-02 2024-10-08 6.5 - -
CVE-2020-26062 2024-11-18 2025-08-06 5.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for cisco unified_computing_system by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.