Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
netbackup_appliance Vendor: veritas

About This Product

netbackup_appliance is a software product offered by veritas. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 42 known vulnerabilities affecting veritas netbackup_appliance. This includes 13 critical-severity issues and 19 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2016 to 2024, indicating a sustained research interest and ongoing security attention. 10 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2015-6550 2016-05-07 2025-04-12 9.8 10.0 Likely
CVE-2015-6551 2016-05-07 2025-04-12 5.9 4.3 Likely
CVE-2015-6552 2016-05-07 2025-04-12 9.8 10.0 Likely
CVE-2016-7399 2017-01-04 2025-04-12 9.8 10.0 Likely
CVE-2017-6399 2017-03-02 2025-04-20 8.8 7.2 Unknown
CVE-2017-6400 2017-03-02 2025-04-20 8.8 7.2 Unknown
CVE-2017-6401 2017-03-02 2025-04-20 7.8 4.6 Unknown
CVE-2017-6402 2017-03-02 2025-04-20 6.5 4.0 Likely
CVE-2017-6403 2017-03-02 2025-04-20 9.8 7.5 Likely
CVE-2017-6404 2017-03-02 2025-04-20 5.5 2.1 Unknown
CVE-2017-6405 2017-03-02 2025-04-20 7.5 5.0 Likely
CVE-2017-6406 2017-03-02 2025-04-20 8.8 7.2 Unknown
CVE-2017-6407 2017-03-02 2025-04-20 8.8 7.2 Unknown
CVE-2017-6408 2017-03-02 2025-04-20 7.0 4.4 Unknown
CVE-2017-6409 2017-03-02 2025-04-20 9.8 7.5 Likely
CVE-2017-8856 2017-05-09 2025-04-20 9.8 7.5 Likely
CVE-2017-8857 2017-05-09 2025-04-20 9.8 10.0 Likely
CVE-2017-8858 2017-05-09 2025-04-20 9.8 10.0 Likely
CVE-2017-8859 2017-05-09 2025-04-20 9.8 10.0 Likely
CVE-2018-18652 2018-10-25 2024-11-21 7.2 9.0 Likely
CVE-2019-9867 2019-03-21 2024-11-21 7.2 4.0 Likely
CVE-2019-9868 2019-03-21 2024-11-21 7.2 4.0 Likely
CVE-2022-22965 2022-04-01 2025-10-30 9.8 7.5 Likely
CVE-2022-36984 2022-07-28 2024-11-21 7.7 - -
CVE-2022-36985 2022-07-28 2024-11-21 7.8 - -
CVE-2022-36986 2022-07-28 2024-11-21 8.6 - -
CVE-2022-36987 2022-07-28 2024-11-21 8.5 - -
CVE-2022-36988 2022-07-28 2024-11-21 8.0 - -
CVE-2022-36989 2022-07-28 2024-11-21 8.8 - -
CVE-2022-36990 2022-07-28 2024-11-21 9.6 - -
CVE-2022-36991 2022-07-28 2024-11-21 8.1 - -
CVE-2022-36992 2022-07-28 2024-11-21 9.9 - -
CVE-2022-36993 2022-07-28 2024-11-21 8.8 - -
CVE-2022-36994 2022-07-28 2024-11-21 6.3 - -
CVE-2022-36995 2022-07-28 2024-11-21 4.3 - -
CVE-2022-36996 2022-07-28 2024-11-21 4.3 - -
CVE-2022-36997 2022-07-28 2024-11-21 7.1 - -
CVE-2022-36998 2022-07-28 2024-11-21 6.3 - -
CVE-2022-36999 2022-07-28 2024-11-21 6.5 - -
CVE-2022-37000 2022-07-28 2024-11-21 6.5 - -
CVE-2023-37237 2023-06-29 2024-11-21 6.5 - -
CVE-2024-28222 2024-03-07 2025-01-21 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for veritas netbackup_appliance by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.