Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mq Vendor: ibm

About This Product

mq is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 48 known vulnerabilities affecting ibm mq. This includes 2 critical-severity issues and 10 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 36 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-1883 2018-12-07 2024-11-21 5.3 5.0 Likely
CVE-2018-1836 2019-03-21 2024-11-21 5.4 3.5 Unknown
CVE-2019-4055 2019-04-19 2024-11-21 7.5 5.0 Likely
CVE-2019-4261 2019-08-05 2024-11-21 6.5 4.0 Likely
CVE-2019-4049 2019-08-20 2024-11-21 5.5 2.1 Unknown
CVE-2019-4378 2019-09-26 2024-11-21 6.5 4.0 Likely
CVE-2019-4227 2019-10-04 2024-11-21 7.3 7.5 Likely
CVE-2019-4655 2019-12-30 2024-11-21 4.3 4.0 Likely
CVE-2019-4568 2020-01-28 2024-11-21 5.9 4.3 Likely
CVE-2019-4614 2020-01-28 2024-11-21 6.5 4.0 Likely
CVE-2019-4619 2020-03-16 2024-11-21 5.5 2.1 Unknown
CVE-2019-4656 2020-03-16 2024-11-21 6.5 4.0 Likely
CVE-2019-4719 2020-03-16 2024-11-21 5.5 2.1 Unknown
CVE-2019-4762 2020-04-16 2024-11-21 7.5 5.0 Likely
CVE-2020-4338 2020-04-16 2024-11-21 5.5 2.1 Unknown
CVE-2020-4267 2020-04-24 2024-11-21 6.5 4.0 Likely
CVE-2020-4310 2020-06-16 2024-11-21 7.5 5.0 Likely
CVE-2020-4320 2020-06-16 2024-11-21 6.5 4.0 Likely
CVE-2020-4870 2020-12-21 2024-11-21 7.5 5.0 Likely
CVE-2020-4682 2021-01-28 2024-11-21 9.8 10.0 Likely
CVE-2020-4931 2021-02-24 2024-11-21 6.5 4.0 Likely
CVE-2021-38949 2021-11-16 2024-11-21 5.5 2.1 Unknown
CVE-2021-38875 2021-11-23 2024-11-21 6.5 4.0 Likely
CVE-2021-39034 2022-02-17 2024-11-21 7.5 5.0 Likely
CVE-2021-38986 2022-03-01 2024-11-21 5.4 5.5 Likely
CVE-2022-22321 2022-03-01 2024-11-21 5.5 2.1 Unknown
CVE-2022-22489 2022-08-19 2024-11-21 9.1 - -
CVE-2022-31772 2022-11-11 2024-11-21 5.3 - -
CVE-2022-42436 2023-02-12 2024-11-21 4.0 - -
CVE-2023-28514 2023-05-19 2024-11-21 6.2 - -
CVE-2023-28950 2023-05-19 2024-11-21 5.1 - -
CVE-2023-28513 2023-07-19 2024-11-21 5.9 - -
CVE-2024-25016 2024-03-03 2025-05-12 7.5 - -
CVE-2023-45177 2024-03-20 2025-07-03 5.3 - -
CVE-2024-25015 2024-05-01 2025-08-21 7.5 - -
CVE-2024-31912 2024-06-28 2024-11-21 7.5 - -
CVE-2024-31919 2024-06-28 2024-11-21 5.9 - -
CVE-2024-35155 2024-06-28 2024-11-21 6.5 - -
CVE-2024-35116 2024-06-28 2024-11-21 5.9 - -
CVE-2024-35156 2024-06-28 2024-11-21 6.5 - -
CVE-2024-52896 2024-12-19 2025-08-19 6.2 - -
CVE-2024-52897 2024-12-19 2025-08-19 6.2 - -
CVE-2024-52898 2025-01-14 2025-07-03 6.2 - -
CVE-2024-54175 2025-02-28 2025-09-26 5.5 - -
CVE-2025-0985 2025-02-28 2025-09-30 5.5 - -
CVE-2025-36100 2025-09-07 2025-12-19 5.1 - -
CVE-2025-36128 2025-10-16 2025-10-28 7.5 - -
CVE-2026-1713 2026-03-03 2026-03-05 5.0 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm mq by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.