Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mitel

About This Vendor

mitel is a technology vendor producing software and infrastructure products. As a software provider, mitel's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mitel's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 135 known vulnerabilities from mitel. This includes 35 critical-severity issues and 37 high-severity issues that represent significant risk. These vulnerabilities affect 464 distinct products across mitel's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2004 through 2026, indicating decades of continuous security attention and research. Organizations deploying mitel products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2004-0944 2004-02-28 2025-04-03 - 5.0 Likely
CVE-2004-0945 2005-02-28 2025-04-03 - 5.0 Likely
CVE-2008-6797 2009-05-07 2025-04-09 - 7.8 Likely
CVE-2014-0160 2014-04-07 2025-10-22 7.5 5.0 Likely
CVE-2017-16250 2018-03-13 2024-11-21 5.3 5.0 Likely
CVE-2017-16251 2018-03-13 2024-11-21 8.8 9.0 Likely
CVE-2018-5779 2018-03-14 2024-11-21 9.8 10.0 Likely
CVE-2018-5780 2018-03-14 2024-11-21 9.8 10.0 Likely
CVE-2018-5781 2018-03-14 2024-11-21 9.8 10.0 Likely
CVE-2018-5782 2018-03-14 2024-11-21 9.8 10.0 Likely
CVE-2018-9101 2018-04-25 2024-11-21 6.1 4.3 Likely
CVE-2018-9102 2018-04-25 2024-11-21 6.5 4.3 Likely
CVE-2018-9103 2018-04-25 2024-11-21 6.1 4.3 Likely
CVE-2018-9104 2018-04-25 2024-11-21 6.1 4.3 Likely
CVE-2018-3639 2018-05-22 2024-11-21 5.5 2.1 Unknown
CVE-2016-6562 2018-07-13 2024-11-21 7.5 2.9 Unknown
CVE-2018-12901 2018-10-23 2024-11-21 6.1 4.3 Likely
CVE-2018-15497 2018-10-23 2024-11-21 9.8 10.0 Likely
CVE-2018-16226 2018-10-23 2024-11-21 6.1 4.3 Likely
CVE-2019-9591 2019-03-06 2024-11-21 6.1 4.3 Likely
CVE-2019-9592 2019-03-06 2024-11-21 6.1 4.3 Likely
CVE-2019-9593 2019-03-06 2024-11-21 6.1 4.3 Likely
CVE-2018-19275 2019-04-02 2024-11-21 9.8 10.0 Likely
CVE-2018-18286 2019-04-25 2024-11-21 9.8 7.5 Likely
CVE-2018-18285 2019-04-25 2024-11-21 9.8 7.5 Likely
CVE-2019-12165 2019-05-29 2024-11-21 9.8 10.0 Likely
CVE-2018-18819 2019-11-12 2024-11-21 5.3 5.0 Likely
CVE-2019-19891 2020-01-13 2024-11-21 5.9 4.3 Likely
CVE-2020-9379 2020-02-25 2024-11-21 6.5 4.0 Likely
CVE-2019-18863 2020-03-02 2024-11-21 5.9 4.3 Likely
CVE-2019-19370 2020-03-02 2024-11-21 6.1 4.3 Likely
CVE-2019-19371 2020-03-02 2024-11-21 6.1 4.3 Likely
CVE-2019-19607 2020-03-02 2024-11-21 9.8 7.5 Likely
CVE-2019-19608 2020-03-02 2024-11-21 9.8 7.5 Likely
CVE-2020-10211 2020-04-17 2025-11-03 9.8 7.5 Likely
CVE-2020-10377 2020-04-17 2025-11-03 9.8 5.0 Likely
CVE-2020-12679 2020-05-07 2024-11-21 6.1 4.3 Likely
CVE-2020-11798 2020-06-10 2024-11-21 5.3 5.0 Likely
CVE-2020-13617 2020-08-26 2024-11-21 7.5 5.0 Likely
CVE-2020-13767 2020-08-26 2024-11-21 5.9 4.3 Likely
CVE-2020-13863 2020-08-26 2024-11-21 8.1 5.5 Likely
CVE-2020-11797 2020-08-26 2024-11-21 7.5 5.0 Likely
CVE-2020-12456 2020-08-26 2025-11-03 8.8 6.5 Likely
CVE-2020-24592 2020-09-25 2024-11-21 5.3 5.0 Likely
CVE-2020-24593 2020-09-25 2024-11-21 7.2 6.5 Likely
CVE-2020-24594 2020-09-25 2024-11-21 9.6 6.8 Likely
CVE-2020-24595 2020-09-25 2024-11-21 5.3 5.0 Likely
CVE-2020-24692 2020-09-25 2024-11-21 7.1 3.6 Unknown
CVE-2020-28351 2020-11-09 2024-11-21 6.1 4.3 Likely
CVE-2020-24693 2020-12-18 2024-11-21 3.3 2.1 Unknown
CVE-2020-25606 2020-12-18 2024-11-21 6.1 4.3 Likely
CVE-2020-25608 2020-12-18 2024-11-21 7.2 6.5 Likely
CVE-2020-25609 2020-12-18 2024-11-21 5.4 3.5 Unknown
CVE-2020-25610 2020-12-18 2024-11-21 5.3 5.0 Likely
CVE-2020-25611 2020-12-18 2024-11-21 6.1 4.3 Likely
CVE-2020-25612 2020-12-18 2024-11-21 4.9 4.0 Likely
CVE-2020-27154 2020-12-18 2024-11-21 8.8 6.5 Likely
CVE-2020-27340 2020-12-18 2024-11-21 6.1 5.8 Likely
CVE-2020-27639 2020-12-18 2024-11-21 8.1 4.8 Unknown
CVE-2020-27640 2020-12-18 2024-11-21 8.1 4.8 Unknown
CVE-2020-35547 2021-01-29 2024-11-21 9.1 6.4 Likely
CVE-2021-3176 2021-01-29 2024-11-21 8.0 6.0 Unknown
CVE-2021-26714 2021-03-29 2024-11-21 9.8 7.5 Likely
CVE-2021-27401 2021-08-13 2024-11-21 6.1 4.3 Likely
CVE-2021-27402 2021-08-13 2024-11-21 6.5 6.4 Likely
CVE-2021-32067 2021-08-13 2024-11-21 6.5 6.4 Likely
CVE-2021-32068 2021-08-13 2024-11-21 3.7 4.3 Likely
CVE-2021-32069 2021-08-13 2024-11-21 4.8 5.8 Likely
CVE-2021-32070 2021-08-13 2024-11-21 5.4 5.8 Likely
CVE-2021-32071 2021-08-13 2024-11-21 9.8 7.5 Likely
CVE-2021-32072 2021-08-13 2024-11-21 6.5 4.0 Likely
CVE-2021-37586 2021-08-13 2024-11-21 4.9 4.0 Likely
CVE-2021-3352 2021-08-13 2024-11-21 9.1 6.4 Likely
CVE-2022-26143 2022-03-10 2025-11-03 9.8 9.0 Likely
CVE-2022-29499 2022-04-26 2025-11-03 9.8 10.0 Likely
CVE-2022-29855 2022-05-11 2024-11-21 6.8 7.2 Unknown
CVE-2022-29854 2022-05-13 2024-11-21 6.8 7.2 Unknown
CVE-2022-31784 2022-06-17 2024-11-21 9.8 6.8 Likely
CVE-2022-36451 2022-10-25 2025-05-07 8.8 - -
CVE-2022-36453 2022-10-25 2025-05-07 8.8 - -
CVE-2022-36454 2022-10-25 2025-05-07 6.5 - -
CVE-2022-36452 2022-10-25 2025-05-07 9.8 - -
CVE-2022-40765 2022-11-22 2025-11-03 6.8 - -
CVE-2022-41223 2022-11-22 2025-11-03 6.8 - -
CVE-2022-41326 2022-11-22 2025-04-29 9.8 - -
CVE-2023-22854 2023-02-13 2025-03-21 7.5 - -
CVE-2023-25597 2023-04-14 2025-02-07 5.9 - -
CVE-2023-25598 2023-05-24 2025-01-17 6.1 - -
CVE-2023-31457 2023-05-24 2025-01-31 9.8 - -
CVE-2023-31459 2023-05-24 2025-01-31 8.8 - -
CVE-2023-31460 2023-05-24 2025-01-31 7.2 - -
CVE-2023-25599 2023-05-24 2025-11-03 7.4 - -
CVE-2023-31458 2023-05-24 2025-01-31 9.8 - -
CVE-2023-32748 2023-08-14 2024-11-21 9.8 - -
CVE-2023-39292 2023-08-14 2024-11-21 9.8 - -
CVE-2023-39293 2023-08-14 2024-11-21 9.8 - -
CVE-2023-39287 2023-08-25 2024-11-21 5.5 - -
CVE-2023-39288 2023-08-25 2024-11-21 5.5 - -
CVE-2023-39289 2023-08-25 2024-11-21 7.5 - -
CVE-2023-39290 2023-08-25 2024-11-21 4.9 - -
CVE-2023-39291 2023-08-25 2024-11-21 4.9 - -
CVE-2023-39285 2023-09-14 2024-11-21 4.3 - -
CVE-2023-39286 2023-09-14 2024-11-21 4.3 - -
CVE-2023-40265 2024-02-08 2025-05-15 8.8 - -
CVE-2023-40266 2024-02-08 2025-05-15 9.8 - -
CVE-2024-28069 2024-03-16 2025-06-02 7.5 - -
CVE-2024-28070 2024-03-16 2025-06-02 6.8 - -
CVE-2024-28066 2024-04-08 2025-06-18 8.8 - -
CVE-2024-35283 2024-05-29 2025-05-29 6.1 - -
CVE-2024-35284 2024-05-29 2025-05-29 5.4 - -
CVE-2024-37569 2024-06-09 2024-11-21 8.8 - -
CVE-2024-37570 2024-06-09 2024-11-21 8.8 - -
CVE-2024-41710 2024-08-12 2025-11-05 7.2 - -
CVE-2024-36446 2024-08-13 2025-03-25 8.8 - -
CVE-2024-42514 2024-10-01 2025-05-30 8.1 - -
CVE-2024-47189 2024-10-21 2025-07-07 7.7 - -
CVE-2024-47223 2024-10-21 2025-07-07 9.4 - -
CVE-2024-47912 2024-10-21 2025-07-07 8.2 - -
CVE-2024-30157 2024-10-21 2024-11-21 7.2 - -
CVE-2024-30158 2024-10-21 2024-10-25 7.2 - -
CVE-2024-30159 2024-10-21 2025-03-22 4.8 - -
CVE-2024-30160 2024-10-21 2025-03-22 4.8 - -
CVE-2024-35285 2024-10-21 2025-07-07 9.8 - -
CVE-2024-35286 2024-10-21 2025-07-07 9.8 - -
CVE-2024-35287 2024-10-21 2025-07-07 6.7 - -
CVE-2024-35314 2024-10-21 2025-07-07 9.8 - -
CVE-2024-35315 2024-10-21 2025-07-07 5.6 - -
CVE-2024-41712 2024-10-21 2025-06-24 6.6 - -
CVE-2024-41713 2024-10-21 2025-11-04 9.1 - -
CVE-2024-41714 2024-10-21 2025-06-24 8.8 - -
CVE-2024-47224 2024-10-21 2025-06-24 6.5 - -
CVE-2024-55550 2024-12-10 2025-11-04 2.7 - -
CVE-2025-52914 2025-08-08 2025-08-08 8.8 - -
CVE-2025-67822 2026-01-15 2026-01-21 9.4 - -
CVE-2025-67823 2026-01-15 2026-01-23 8.2 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mitel by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mitel's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.