Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
vios Vendor: ibm

About This Product

vios is a software product offered by ibm. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 85 known vulnerabilities affecting ibm vios. This includes 3 critical-severity issues and 36 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2025, indicating a sustained research interest and ongoing security attention. 42 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-3699 2009-10-15 2025-04-09 - 10.0 Likely
CVE-2010-0960 2010-03-10 2025-04-11 - 7.2 Unknown
CVE-2010-0961 2010-03-10 2025-04-11 - 7.2 Unknown
CVE-2010-1039 2010-05-20 2025-04-11 - 10.0 Likely
CVE-2010-3405 2010-09-16 2025-04-11 - 6.8 Unknown
CVE-2011-1385 2012-03-02 2025-04-11 - 7.8 Likely
CVE-2012-0745 2012-05-04 2025-04-11 - 7.2 Unknown
CVE-2012-2192 2012-06-20 2025-04-11 - 4.9 Unknown
CVE-2012-2200 2012-06-27 2025-04-11 - 7.2 Unknown
CVE-2012-0723 2012-07-30 2025-04-11 - 4.9 Unknown
CVE-2012-4817 2012-09-14 2025-04-11 - 5.0 Likely
CVE-2012-4833 2012-10-01 2025-04-11 - 2.1 Unknown
CVE-2012-4845 2012-10-20 2025-04-11 - 6.8 Likely
CVE-2013-3035 2013-06-21 2025-04-11 - 7.1 Likely
CVE-2013-3005 2013-07-06 2025-04-11 - 8.5 Unknown
CVE-2013-4011 2013-07-18 2025-04-11 - 7.2 Unknown
CVE-2014-0930 2014-05-08 2025-04-12 - 4.7 Unknown
CVE-2014-3977 2014-06-08 2025-04-12 - 6.9 Unknown
CVE-2014-3074 2014-07-02 2025-04-12 - 7.2 Unknown
CVE-2014-3566 2014-10-15 2025-04-12 3.4 4.3 Likely
CVE-2014-8904 2015-01-15 2025-04-12 - 7.2 Unknown
CVE-2015-4948 2015-10-16 2025-04-12 - 6.9 Unknown
CVE-2016-0266 2016-08-08 2025-04-12 3.7 4.3 Likely
CVE-2016-0281 2016-08-08 2025-04-12 3.7 4.3 Likely
CVE-2016-6079 2017-02-15 2025-04-20 7.8 7.2 Unknown
CVE-2016-8972 2017-02-15 2025-04-20 7.8 7.2 Unknown
CVE-2020-4788 2020-11-20 2024-11-21 4.7 1.9 Unknown
CVE-2020-4829 2020-12-10 2024-11-21 7.8 7.2 Unknown
CVE-2020-4887 2021-01-20 2024-11-21 5.5 2.1 Unknown
CVE-2021-29693 2021-06-28 2024-11-21 4.4 2.1 Unknown
CVE-2021-29741 2021-08-02 2024-11-21 7.8 7.2 Unknown
CVE-2021-29727 2021-08-26 2024-11-21 5.5 4.9 Unknown
CVE-2021-29801 2021-08-26 2024-11-21 7.8 7.2 Unknown
CVE-2021-29862 2021-08-26 2024-11-21 5.5 4.9 Unknown
CVE-2021-29860 2021-11-17 2024-11-21 6.2 2.1 Unknown
CVE-2021-29861 2021-11-17 2024-11-21 6.2 2.1 Unknown
CVE-2021-38990 2022-01-10 2024-11-21 7.8 4.6 Unknown
CVE-2021-38991 2022-01-11 2024-11-21 7.8 4.6 Unknown
CVE-2021-38994 2022-02-24 2024-11-21 5.5 2.1 Unknown
CVE-2021-38995 2022-02-24 2024-11-21 5.5 2.1 Unknown
CVE-2021-38993 2022-02-25 2024-11-21 5.5 2.1 Unknown
CVE-2021-38955 2022-03-01 2024-11-21 4.4 2.1 Unknown
CVE-2021-38996 2022-03-02 2024-11-21 5.5 2.1 Unknown
CVE-2022-22350 2022-03-02 2024-11-21 5.5 2.1 Unknown
CVE-2021-38988 2022-03-07 2024-11-21 5.5 4.9 Unknown
CVE-2021-38989 2022-03-07 2024-11-21 5.5 4.9 Unknown
CVE-2022-22351 2022-03-07 2024-11-21 8.6 7.8 Likely
CVE-2022-22444 2022-06-15 2024-11-21 5.5 2.1 Unknown
CVE-2022-34356 2022-09-13 2024-11-21 7.8 - -
CVE-2022-36768 2022-09-13 2024-11-21 7.8 - -
CVE-2022-43382 2022-12-20 2024-11-21 6.2 - -
CVE-2022-39165 2022-12-23 2024-11-21 6.2 - -
CVE-2022-40233 2022-12-23 2024-11-21 6.2 - -
CVE-2022-43380 2022-12-23 2024-11-21 6.2 - -
CVE-2022-43381 2022-12-23 2024-11-21 6.2 - -
CVE-2022-39164 2022-12-23 2024-11-21 6.2 - -
CVE-2022-41290 2022-12-23 2024-11-21 8.4 - -
CVE-2022-43848 2022-12-23 2024-11-21 6.2 - -
CVE-2022-43849 2022-12-23 2024-11-21 6.2 - -
CVE-2022-47990 2023-01-18 2024-11-21 6.2 - -
CVE-2023-26286 2023-04-26 2024-11-21 8.4 - -
CVE-2023-28528 2023-04-28 2025-11-04 8.4 - -
CVE-2023-40371 2023-08-24 2024-11-21 6.2 - -
CVE-2023-45167 2023-11-10 2024-11-21 6.2 - -
CVE-2023-45168 2023-12-01 2024-11-21 8.4 - -
CVE-2023-45166 2023-12-13 2024-11-21 8.4 - -
CVE-2023-45170 2023-12-13 2024-11-21 8.4 - -
CVE-2023-45174 2023-12-13 2024-11-21 8.4 - -
CVE-2023-45172 2023-12-19 2024-11-21 6.2 - -
CVE-2023-45173 2024-01-11 2024-11-21 6.2 - -
CVE-2023-45175 2024-01-11 2024-11-21 6.2 - -
CVE-2023-45169 2024-01-11 2024-11-21 6.2 - -
CVE-2023-45171 2024-01-11 2024-11-21 6.2 - -
CVE-2024-25021 2024-02-22 2025-05-06 8.4 - -
CVE-2024-27273 2024-05-07 2025-08-18 8.1 - -
CVE-2024-27260 2024-05-16 2025-07-29 8.4 - -
CVE-2024-47115 2024-12-07 2025-01-21 7.8 - -
CVE-2024-47102 2024-12-25 2025-09-29 5.5 - -
CVE-2024-52906 2024-12-25 2025-07-25 5.5 - -
CVE-2025-33112 2025-06-10 2025-07-25 8.4 - -
CVE-2025-36244 2025-09-16 2025-10-17 7.4 - -
CVE-2025-36096 2025-11-13 2025-11-19 9.0 - -
CVE-2025-36236 2025-11-13 2025-11-19 8.2 - -
CVE-2025-36250 2025-11-13 2025-11-19 10.0 - -
CVE-2025-36251 2025-11-13 2025-11-19 9.6 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm vios by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.