Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

metagauss

About This Vendor

metagauss is a technology vendor producing software and infrastructure products. As a software provider, metagauss's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of metagauss's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 104 known vulnerabilities from metagauss. This includes 5 critical-severity issues and 31 high-severity issues that represent significant risk. These vulnerabilities affect 7 distinct products across metagauss's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2019 through 2025, reflecting sustained security scrutiny over multiple years. Organizations deploying metagauss products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-15873 2019-09-03 2024-11-21 8.8 6.5 Likely
CVE-2020-9454 2020-03-06 2024-11-21 8.8 6.8 Likely
CVE-2020-9455 2020-03-06 2024-11-21 4.3 4.0 Likely
CVE-2020-9456 2020-03-06 2024-11-21 8.8 6.5 Likely
CVE-2020-9457 2020-03-06 2024-11-21 8.8 6.5 Likely
CVE-2020-9458 2020-03-06 2024-11-21 8.8 6.5 Likely
CVE-2020-8435 2020-03-12 2024-11-21 8.1 5.5 Likely
CVE-2020-8436 2020-03-12 2024-11-21 6.1 4.3 Likely
CVE-2021-24703 2021-11-23 2024-11-21 5.7 3.5 Unknown
CVE-2021-4073 2021-12-14 2024-11-21 9.8 6.8 Likely
CVE-2021-24862 2022-01-10 2024-11-21 7.2 6.5 Likely
CVE-2022-0232 2022-01-18 2024-11-21 4.8 3.5 Unknown
CVE-2022-0233 2022-01-18 2024-11-21 6.4 3.5 Unknown
CVE-2021-24648 2022-02-01 2024-11-21 6.1 4.3 Likely
CVE-2022-0420 2022-03-07 2024-11-21 7.2 6.5 Likely
CVE-2022-3578 2022-11-14 2025-04-30 6.1 - -
CVE-2022-41791 2022-11-17 2025-02-20 6.5 - -
CVE-2021-25059 2022-11-28 2025-04-25 4.3 - -
CVE-2023-25991 2023-03-13 2024-11-21 5.4 - -
CVE-2023-0940 2023-03-20 2025-02-26 8.8 - -
CVE-2023-0889 2023-04-17 2025-02-06 6.5 - -
CVE-2023-2499 2023-05-16 2024-11-21 9.8 - -
CVE-2023-2548 2023-05-16 2024-11-21 6.6 - -
CVE-2023-33326 2023-05-28 2024-11-21 7.1 - -
CVE-2022-36345 2023-05-28 2024-11-21 4.3 - -
CVE-2023-35884 2023-06-20 2024-11-21 7.1 - -
CVE-2022-38062 2023-07-17 2024-11-21 4.3 - -
CVE-2023-3403 2023-07-18 2024-11-21 5.4 - -
CVE-2023-3713 2023-07-18 2024-11-21 8.8 - -
CVE-2023-3714 2023-07-18 2024-11-21 7.5 - -
CVE-2023-3404 2023-08-31 2024-11-21 4.9 - -
CVE-2023-45637 2023-10-25 2024-11-21 7.1 - -
CVE-2023-4250 2023-10-31 2025-04-03 6.1 - -
CVE-2023-4251 2023-10-31 2025-04-22 4.3 - -
CVE-2023-5238 2023-10-31 2025-04-22 6.1 - -
CVE-2023-5519 2023-10-31 2025-04-23 4.3 - -
CVE-2023-47644 2023-11-18 2024-11-21 5.4 - -
CVE-2023-4252 2023-11-27 2024-11-21 5.3 - -
CVE-2023-47645 2023-11-30 2024-11-21 4.3 - -
CVE-2023-50846 2023-12-28 2024-11-21 7.6 - -
CVE-2022-36352 2024-01-08 2024-11-21 6.3 - -
CVE-2023-6447 2024-01-22 2025-06-17 5.3 - -
CVE-2023-51509 2024-02-01 2024-11-21 7.1 - -
CVE-2024-1123 2024-03-09 2025-01-15 6.5 - -
CVE-2024-1124 2024-03-09 2025-01-15 4.3 - -
CVE-2024-1125 2024-03-09 2025-01-15 6.5 - -
CVE-2024-1320 2024-03-09 2025-01-15 6.5 - -
CVE-2024-1126 2024-03-13 2025-01-15 5.3 - -
CVE-2024-1127 2024-03-13 2025-01-15 4.3 - -
CVE-2024-1321 2024-03-13 2025-01-15 5.3 - -
CVE-2024-29113 2024-03-19 2025-02-04 7.1 - -
CVE-2024-24832 2024-03-23 2025-02-04 8.2 - -
CVE-2024-2951 2024-03-26 2025-02-04 4.3 - -
CVE-2024-29776 2024-03-27 2025-05-28 5.9 - -
CVE-2024-30241 2024-03-28 2025-02-04 8.5 - -
CVE-2024-30490 2024-03-29 2025-02-04 9.3 - -
CVE-2024-30491 2024-03-29 2025-02-04 8.5 - -
CVE-2024-30513 2024-03-29 2025-02-04 6.5 - -
CVE-2024-31291 2024-04-07 2025-02-04 4.3 - -
CVE-2024-1990 2024-04-09 2025-01-17 8.8 - -
CVE-2024-1991 2024-04-09 2025-01-31 8.8 - -
CVE-2024-25935 2024-04-11 2025-02-03 4.3 - -
CVE-2024-31362 2024-04-12 2025-02-07 4.3 - -
CVE-2023-23976 2024-04-24 2025-02-04 7.5 - -
CVE-2024-32772 2024-04-24 2025-02-04 4.3 - -
CVE-2024-32808 2024-04-24 2025-02-04 5.4 - -
CVE-2023-23989 2024-04-24 2025-02-04 5.3 - -
CVE-2024-3606 2024-05-02 2025-02-10 4.3 - -
CVE-2024-33947 2024-05-03 2025-02-03 7.1 - -
CVE-2023-33321 2024-05-17 2025-02-03 5.3 - -
CVE-2024-32774 2024-05-17 2025-02-03 4.3 - -
CVE-2023-51543 2024-06-04 2025-02-04 5.3 - -
CVE-2023-51544 2024-06-04 2025-02-04 5.3 - -
CVE-2024-5453 2024-06-05 2024-11-21 4.3 - -
CVE-2024-31275 2024-06-09 2024-11-21 8.2 - -
CVE-2023-52117 2024-06-12 2024-11-21 4.3 - -
CVE-2024-6410 2024-07-10 2025-02-10 4.3 - -
CVE-2024-6411 2024-07-10 2025-02-10 8.8 - -
CVE-2024-39643 2024-08-01 2024-09-11 5.8 - -
CVE-2024-43317 2024-08-19 2025-02-04 4.3 - -
CVE-2024-8369 2024-09-10 2024-09-26 5.3 - -
CVE-2024-8861 2024-09-26 2024-10-01 6.4 - -
CVE-2024-49273 2024-10-21 2024-10-29 4.3 - -
CVE-2024-9829 2024-10-23 2024-10-25 6.5 - -
CVE-2024-9864 2024-10-24 2025-01-15 6.1 - -
CVE-2024-9865 2024-10-24 2025-01-15 6.1 - -
CVE-2024-37453 2024-11-01 2025-02-10 4.3 - -
CVE-2024-43223 2024-11-01 2025-08-12 4.3 - -
CVE-2024-10508 2024-11-09 2025-01-29 9.8 - -
CVE-2024-10900 2024-11-20 2024-11-29 6.5 - -
CVE-2023-49831 2024-12-09 2025-02-04 7.5 - -
CVE-2024-12024 2024-12-17 2025-01-10 7.2 - -
CVE-2025-24686 2025-01-31 2025-02-04 7.1 - -
CVE-2024-13741 2025-02-18 2025-02-24 5.4 - -
CVE-2024-13740 2025-02-18 2025-02-24 4.3 - -
CVE-2024-13526 2025-03-07 2025-08-12 4.3 - -
CVE-2025-0723 2025-03-22 2025-03-27 6.5 - -
CVE-2025-0724 2025-03-22 2025-03-27 8.8 - -
CVE-2025-1408 2025-03-22 2025-03-27 4.3 - -
CVE-2024-4665 2025-05-15 2025-11-13 6.4 - -
CVE-2024-9390 2025-05-15 2025-06-04 4.8 - -
CVE-2025-6586 2025-07-04 2025-07-09 7.2 - -
CVE-2025-6977 2025-07-16 2025-07-16 6.1 - -
CVE-2017-20208 2025-10-18 2025-12-19 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for metagauss by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with metagauss's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.