Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
jt2go Vendor: siemens

About This Product

jt2go is a software product offered by siemens. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 166 known vulnerabilities affecting siemens jt2go. This includes 121 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2021 to 2024, indicating a recent active security attention. 33 medium-severity issues and 12 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-26980 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26981 2021-01-12 2024-11-21 6.5 4.3 Likely
CVE-2020-26982 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26983 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26984 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26985 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26986 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26987 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26988 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26989 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2020-26990 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26991 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26992 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2020-26993 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2020-26994 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26995 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-26996 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-28383 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2021-25173 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2021-25174 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2021-25175 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2021-25176 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2021-25177 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2021-25178 2021-01-18 2024-11-21 7.8 6.8 Likely
CVE-2020-26998 2021-02-09 2024-11-21 5.5 2.1 Unknown
CVE-2020-26999 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27000 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27001 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27002 2021-02-09 2024-11-21 7.1 3.6 Unknown
CVE-2020-27003 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27004 2021-02-09 2024-11-21 5.5 4.3 Likely
CVE-2020-27005 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27006 2021-02-09 2024-11-21 7.8 4.6 Unknown
CVE-2020-27007 2021-02-09 2024-11-21 5.5 4.3 Likely
CVE-2020-27008 2021-02-09 2024-11-21 5.5 2.1 Unknown
CVE-2020-28394 2021-02-09 2024-11-21 5.5 2.1 Unknown
CVE-2021-27390 2021-06-08 2024-11-21 7.8 6.8 Likely
CVE-2021-32946 2021-06-17 2024-11-21 7.8 6.8 Likely
CVE-2021-32936 2021-06-17 2024-11-21 7.8 6.8 Likely
CVE-2021-32938 2021-06-17 2024-11-21 7.1 5.8 Likely
CVE-2021-32940 2021-06-17 2024-11-21 7.1 5.8 Likely
CVE-2021-32944 2021-06-17 2024-11-21 7.8 6.8 Likely
CVE-2021-32948 2021-06-17 2024-11-21 7.8 6.8 Likely
CVE-2021-32950 2021-06-17 2024-11-21 7.1 5.8 Likely
CVE-2021-32952 2021-06-17 2024-11-21 7.8 6.8 Likely
CVE-2021-34291 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34292 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34293 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34294 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34295 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34296 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34297 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34298 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34299 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34300 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34301 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34302 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34303 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34304 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34305 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34306 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34307 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34308 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34309 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34310 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34311 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34312 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34313 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34314 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34315 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34316 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34317 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34318 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34319 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34320 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34321 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34322 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34323 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34324 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34325 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34326 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34327 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34328 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34329 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34330 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34331 2021-07-13 2024-11-21 7.8 6.8 Likely
CVE-2021-34332 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-34333 2021-07-13 2024-11-21 5.5 4.3 Likely
CVE-2021-33717 2021-08-10 2024-11-21 5.5 4.3 Likely
CVE-2021-33738 2021-08-10 2024-11-21 3.3 4.3 Likely
CVE-2021-43336 2021-11-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44001 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44002 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44003 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44004 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44005 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44006 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44007 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44008 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44009 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44010 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44011 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44012 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44013 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44014 2021-12-14 2024-11-21 7.8 6.8 Likely
CVE-2021-44015 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44017 2021-12-14 2024-11-21 5.5 4.3 Likely
CVE-2021-44000 2022-02-09 2024-11-21 7.8 6.8 Likely
CVE-2021-44016 2022-02-09 2024-11-21 7.8 6.8 Likely
CVE-2021-44018 2022-02-09 2024-11-21 7.8 6.8 Likely
CVE-2022-29028 2022-05-20 2024-11-21 5.5 4.3 Likely
CVE-2022-29029 2022-05-20 2024-11-21 5.5 4.3 Likely
CVE-2022-29030 2022-05-20 2024-11-21 5.5 4.3 Likely
CVE-2022-29031 2022-05-20 2024-11-21 5.5 4.3 Likely
CVE-2022-29032 2022-05-20 2024-11-21 7.8 6.8 Likely
CVE-2022-29033 2022-05-20 2024-11-21 7.8 6.8 Likely
CVE-2022-2069 2022-10-20 2024-11-21 7.8 - -
CVE-2022-39136 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41660 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41661 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41662 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41663 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41664 2022-11-08 2024-11-21 7.8 - -
CVE-2022-41278 2022-12-13 2024-11-21 3.3 - -
CVE-2022-41279 2022-12-13 2024-11-21 3.3 - -
CVE-2022-41280 2022-12-13 2024-11-21 3.3 - -
CVE-2022-41281 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41282 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41283 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41284 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41285 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41286 2022-12-13 2024-11-21 7.8 - -
CVE-2022-41287 2022-12-13 2024-11-21 3.3 - -
CVE-2022-41288 2022-12-13 2024-11-21 3.3 - -
CVE-2022-45484 2022-12-13 2024-11-21 3.3 - -
CVE-2022-3159 2023-01-13 2024-11-21 7.8 - -
CVE-2022-3160 2023-01-13 2024-11-21 7.8 - -
CVE-2022-3161 2023-01-13 2024-11-21 7.8 - -
CVE-2023-1709 2023-06-07 2024-11-21 7.8 - -
CVE-2023-33121 2023-06-13 2024-11-21 3.3 - -
CVE-2023-33122 2023-06-13 2024-11-21 3.3 - -
CVE-2023-33123 2023-06-13 2024-11-21 7.8 - -
CVE-2023-33124 2023-06-13 2024-11-21 7.8 - -
CVE-2023-28830 2023-08-08 2024-11-21 7.8 - -
CVE-2023-38682 2023-08-08 2024-11-21 7.8 - -
CVE-2023-38683 2023-08-08 2024-11-21 7.8 - -
CVE-2023-38070 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38071 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38072 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38073 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38074 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38075 2023-09-12 2024-11-21 7.8 - -
CVE-2023-38076 2023-09-12 2024-11-21 7.8 - -
CVE-2021-38405 2023-11-21 2024-11-21 7.8 - -
CVE-2023-51439 2024-01-09 2024-11-21 7.8 - -
CVE-2023-51744 2024-01-09 2024-11-21 3.3 - -
CVE-2023-51745 2024-01-09 2024-11-21 7.8 - -
CVE-2023-51746 2024-01-09 2024-11-21 7.8 - -
CVE-2024-26275 2024-04-09 2025-10-03 7.8 - -
CVE-2024-26276 2024-04-09 2025-10-03 3.3 - -
CVE-2024-32635 2024-05-14 2025-10-03 7.8 - -
CVE-2024-32636 2024-05-14 2025-10-03 7.8 - -
CVE-2024-32637 2024-05-14 2025-10-03 3.3 - -
CVE-2024-34085 2024-05-14 2025-10-03 7.8 - -
CVE-2024-34086 2024-05-14 2025-10-03 7.8 - -
CVE-2024-41902 2024-10-08 2024-10-23 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for siemens jt2go by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.