Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
webex_meetings Vendor: cisco

About This Product

webex_meetings is a software product developed by cisco, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 68 known vulnerabilities affecting cisco webex_meetings. This includes 8 critical-severity issues and 17 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2025, indicating a sustained research interest and ongoing security attention. 43 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2015-6384 2015-12-05 2025-04-12 - 4.3 Likely
CVE-2017-6753 2017-07-25 2025-04-20 8.8 9.3 Likely
CVE-2017-12368 2017-11-30 2025-04-20 9.6 6.8 Likely
CVE-2017-12369 2017-11-30 2025-04-20 9.6 6.8 Likely
CVE-2017-12370 2017-11-30 2025-04-20 9.6 6.8 Likely
CVE-2017-12371 2017-11-30 2025-04-20 9.6 6.8 Likely
CVE-2017-12372 2017-11-30 2025-04-20 9.6 6.8 Likely
CVE-2018-0103 2018-01-04 2024-11-21 7.8 9.3 Likely
CVE-2018-0104 2018-01-04 2024-11-21 9.6 9.3 Likely
CVE-2017-17428 2018-03-05 2024-11-21 5.9 7.1 Likely
CVE-2018-0112 2018-04-19 2024-11-21 9.0 6.0 Unknown
CVE-2018-0264 2018-05-02 2024-11-21 9.6 6.8 Likely
CVE-2018-0356 2018-06-07 2024-11-21 6.1 4.3 Likely
CVE-2018-0357 2018-06-07 2024-11-21 6.1 4.3 Likely
CVE-2018-0390 2018-07-18 2024-11-21 6.1 4.3 Likely
CVE-2019-1677 2019-02-07 2024-11-21 4.6 1.9 Unknown
CVE-2019-1674 2019-02-28 2024-11-21 7.8 9.0 Likely
CVE-2019-1948 2019-08-21 2024-11-21 5.9 4.3 Likely
CVE-2019-15960 2019-11-26 2024-11-21 5.4 6.5 Likely
CVE-2019-16001 2019-11-26 2024-11-21 5.3 4.4 Unknown
CVE-2020-3127 2020-03-04 2024-11-21 7.8 9.3 Likely
CVE-2020-3128 2020-03-04 2024-11-21 7.8 9.3 Likely
CVE-2020-3155 2020-03-04 2024-11-21 7.4 5.8 Likely
CVE-2020-3182 2020-03-04 2024-11-21 4.3 3.3 Unknown
CVE-2020-3194 2020-04-15 2024-11-21 7.8 9.3 Likely
CVE-2020-3263 2020-06-18 2024-11-21 7.5 7.6 Unknown
CVE-2020-3342 2020-06-18 2024-11-21 8.8 9.3 Likely
CVE-2020-3347 2020-06-18 2024-11-21 5.5 2.1 Unknown
CVE-2020-3361 2020-06-18 2024-11-21 8.1 7.5 Likely
CVE-2020-3345 2020-07-16 2024-11-21 4.3 4.3 Likely
CVE-2020-3501 2020-08-17 2024-11-21 4.1 3.5 Unknown
CVE-2020-3502 2020-08-17 2024-11-21 4.1 3.5 Unknown
CVE-2020-3440 2020-08-26 2024-11-21 6.5 4.3 Likely
CVE-2020-3541 2020-09-04 2024-11-21 4.4 2.1 Unknown
CVE-2019-15283 2020-09-23 2024-11-21 7.8 9.3 Likely
CVE-2019-15285 2020-09-23 2024-11-21 7.8 9.3 Likely
CVE-2019-15287 2020-09-23 2024-11-21 7.8 9.3 Likely
CVE-2020-3573 2020-11-06 2024-11-21 7.8 9.3 Likely
CVE-2020-3588 2020-11-06 2024-11-21 7.3 4.6 Unknown
CVE-2020-3603 2020-11-06 2024-11-21 7.8 9.3 Likely
CVE-2020-3604 2020-11-06 2024-11-21 7.8 9.3 Likely
CVE-2020-27126 2020-11-18 2024-11-21 6.1 4.3 Likely
CVE-2020-3441 2020-11-18 2024-11-21 5.3 5.0 Likely
CVE-2021-1310 2021-01-13 2024-11-21 4.7 4.3 Likely
CVE-2021-1311 2021-01-13 2024-11-21 5.4 5.5 Likely
CVE-2021-1221 2021-02-04 2024-11-21 4.1 3.5 Unknown
CVE-2021-1351 2021-02-17 2024-11-21 6.1 4.3 Likely
CVE-2021-1372 2021-02-17 2024-11-21 5.5 2.1 Unknown
CVE-2021-1420 2021-04-08 2024-11-21 4.7 4.3 Likely
CVE-2021-1467 2021-04-08 2024-11-21 4.3 4.0 Likely
CVE-2021-1544 2021-06-04 2024-11-21 5.5 2.1 Unknown
CVE-2021-34743 2021-10-21 2024-11-21 4.3 5.8 Likely
CVE-2021-40128 2021-11-04 2024-11-21 5.3 5.0 Likely
CVE-2022-20778 2022-04-21 2024-11-21 6.1 4.3 Likely
CVE-2022-20820 2022-08-10 2024-11-21 5.4 - -
CVE-2022-20852 2022-08-10 2024-11-21 5.4 - -
CVE-2023-20132 2023-04-05 2024-11-21 5.4 - -
CVE-2023-20134 2023-04-05 2024-11-21 5.4 - -
CVE-2023-20133 2023-07-07 2024-11-21 5.4 - -
CVE-2023-20180 2023-07-07 2024-11-21 4.3 - -
CVE-2022-20654 2024-11-15 2025-08-07 6.1 - -
CVE-2021-1410 2024-11-18 2025-08-05 4.3 - -
CVE-2025-20246 2025-05-21 2025-07-14 6.1 - -
CVE-2025-20247 2025-05-21 2025-07-14 6.1 - -
CVE-2025-20250 2025-05-21 2025-07-14 6.1 - -
CVE-2025-20255 2025-05-21 2025-07-14 4.3 - -
CVE-2025-20291 2025-09-03 2025-09-09 4.3 - -
CVE-2025-20328 2025-09-03 2025-09-10 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for cisco webex_meetings by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.