Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mitsubishielectric

About This Vendor

mitsubishielectric is a technology vendor producing software and infrastructure products. As a software provider, mitsubishielectric's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mitsubishielectric's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 158 known vulnerabilities from mitsubishielectric. This includes 39 critical-severity issues and 74 high-severity issues that represent significant risk. These vulnerabilities affect 1983 distinct products across mitsubishielectric's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2024, indicating decades of continuous security attention and research. Organizations deploying mitsubishielectric products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-2817 2014-02-24 2025-04-11 - 9.3 Likely
CVE-2016-8368 2017-02-13 2025-04-20 8.6 5.0 Likely
CVE-2016-8370 2017-02-13 2025-04-20 7.5 5.0 Likely
CVE-2017-9634 2018-04-17 2024-11-21 9.8 10.0 Likely
CVE-2017-9636 2018-04-17 2024-11-21 9.8 10.0 Likely
CVE-2017-9638 2018-04-17 2024-11-21 9.8 10.0 Likely
CVE-2019-6535 2019-02-05 2025-06-26 7.5 5.0 Likely
CVE-2019-10977 2019-05-23 2024-11-21 7.5 7.8 Likely
CVE-2019-10972 2019-07-26 2024-11-21 5.5 7.1 Likely
CVE-2019-10976 2019-07-26 2024-11-21 5.5 4.3 Likely
CVE-2019-14925 2019-10-28 2024-11-21 6.5 4.0 Likely
CVE-2019-14926 2019-10-28 2024-11-21 9.8 7.5 Likely
CVE-2019-14927 2019-10-28 2024-11-21 7.5 5.0 Likely
CVE-2019-14928 2019-10-28 2024-11-21 5.4 3.5 Unknown
CVE-2019-14929 2019-10-28 2024-11-21 9.8 5.0 Likely
CVE-2019-14930 2019-10-28 2024-11-21 9.8 10.0 Likely
CVE-2019-14931 2019-10-28 2024-11-21 9.8 10.0 Likely
CVE-2019-13555 2019-11-13 2024-11-21 5.9 4.3 Likely
CVE-2020-5531 2020-02-17 2024-11-21 9.8 7.5 Likely
CVE-2020-5542 2020-03-16 2024-11-21 9.8 7.5 Likely
CVE-2020-5543 2020-03-16 2024-11-21 9.8 7.5 Likely
CVE-2020-5544 2020-03-16 2024-11-21 9.8 7.5 Likely
CVE-2020-5545 2020-03-16 2024-11-21 9.8 7.5 Likely
CVE-2020-5546 2020-03-16 2024-11-21 8.8 5.8 Unknown
CVE-2020-5547 2020-03-16 2024-11-21 9.8 7.5 Likely
CVE-2020-5527 2020-03-30 2024-11-21 7.5 5.0 Likely
CVE-2020-13238 2020-06-10 2024-11-21 7.5 7.8 Likely
CVE-2020-5594 2020-06-23 2024-11-21 9.8 7.5 Likely
CVE-2020-5602 2020-06-30 2024-11-21 7.5 5.0 Likely
CVE-2020-5603 2020-06-30 2024-11-21 7.5 5.0 Likely
CVE-2020-5595 2020-07-07 2024-11-21 9.8 7.5 Likely
CVE-2020-5596 2020-07-07 2024-11-21 7.5 5.0 Likely
CVE-2020-5597 2020-07-07 2024-11-21 7.5 5.0 Likely
CVE-2020-5598 2020-07-07 2024-11-21 7.5 5.0 Likely
CVE-2020-5599 2020-07-07 2024-11-21 9.8 10.0 Likely
CVE-2020-5600 2020-07-07 2024-11-21 7.5 5.0 Likely
CVE-2020-12011 2020-07-16 2024-11-21 9.8 7.5 Likely
CVE-2020-12009 2020-07-16 2024-11-21 7.5 5.0 Likely
CVE-2020-12007 2020-07-16 2024-11-21 9.8 7.5 Likely
CVE-2020-12013 2020-07-16 2024-11-21 9.1 6.4 Likely
CVE-2020-12015 2020-07-16 2024-11-21 7.5 5.0 Likely
CVE-2020-16226 2020-10-05 2024-11-21 9.8 7.5 Likely
CVE-2020-5652 2020-11-02 2024-11-21 7.5 5.0 Likely
CVE-2020-5653 2020-11-02 2024-11-21 9.8 7.5 Likely
CVE-2020-5654 2020-11-02 2024-11-21 7.5 5.0 Likely
CVE-2020-5655 2020-11-02 2024-11-21 7.5 5.0 Likely
CVE-2020-5656 2020-11-02 2024-11-21 9.8 7.5 Likely
CVE-2020-5657 2020-11-02 2024-11-21 6.5 3.3 Unknown
CVE-2020-5658 2020-11-02 2024-11-21 7.5 5.0 Likely
CVE-2020-5644 2020-11-06 2024-11-21 9.8 7.5 Likely
CVE-2020-5645 2020-11-06 2024-11-21 7.5 5.0 Likely
CVE-2020-5646 2020-11-06 2024-11-21 7.5 5.0 Likely
CVE-2020-5647 2020-11-06 2024-11-21 9.8 7.5 Likely
CVE-2020-5648 2020-11-06 2024-11-21 9.8 6.5 Likely
CVE-2020-5649 2020-11-06 2024-11-21 7.5 5.0 Likely
CVE-2020-5666 2020-11-16 2024-11-21 7.5 7.1 Likely
CVE-2020-5668 2020-11-20 2024-11-21 7.5 7.8 Likely
CVE-2020-16850 2020-11-30 2024-11-21 7.5 7.8 Likely
CVE-2020-5675 2020-12-04 2024-11-21 7.5 5.0 Likely
CVE-2020-5665 2020-12-14 2024-11-21 7.4 3.3 Unknown
CVE-2021-20586 2021-01-29 2024-11-21 7.5 7.8 Likely
CVE-2021-20587 2021-02-19 2025-06-13 7.5 7.5 Likely
CVE-2021-20588 2021-02-19 2025-06-13 7.5 7.5 Likely
CVE-2021-20590 2021-04-22 2024-11-21 7.5 4.3 Likely
CVE-2021-20591 2021-06-11 2024-11-21 7.5 7.8 Likely
CVE-2021-27040 2021-06-25 2024-11-21 3.3 4.3 Likely
CVE-2021-27041 2021-06-25 2024-11-21 7.8 6.8 Likely
CVE-2021-20596 2021-07-22 2024-11-21 7.5 5.0 Likely
CVE-2021-20592 2021-08-05 2024-11-21 7.5 7.8 Likely
CVE-2021-20594 2021-08-06 2024-11-21 7.5 5.0 Likely
CVE-2021-20597 2021-08-06 2024-11-21 9.1 6.4 Likely
CVE-2021-20598 2021-08-06 2024-11-21 5.3 5.0 Likely
CVE-2021-20600 2021-10-08 2024-11-21 5.9 7.1 Likely
CVE-2021-20599 2021-10-14 2024-11-21 9.1 5.0 Likely
CVE-2018-16060 2021-10-15 2024-11-21 7.5 5.0 Likely
CVE-2018-16061 2021-10-15 2024-11-21 6.1 4.3 Likely
CVE-2021-20601 2021-11-23 2024-11-21 7.5 7.8 Likely
CVE-2021-20606 2021-12-17 2024-11-21 5.5 4.3 Likely
CVE-2021-20607 2021-12-17 2024-11-21 5.5 4.3 Likely
CVE-2021-20608 2021-12-17 2024-11-21 7.5 5.0 Likely
CVE-2021-20612 2022-01-14 2024-11-21 7.5 7.8 Likely
CVE-2021-20613 2022-01-14 2024-11-21 7.5 7.8 Likely
CVE-2022-23127 2022-01-21 2024-11-21 6.1 4.3 Likely
CVE-2022-23128 2022-01-21 2024-11-21 9.8 7.5 Likely
CVE-2022-23129 2022-01-21 2024-11-21 5.5 2.1 Unknown
CVE-2022-23130 2022-01-21 2026-01-08 5.9 4.3 Likely
CVE-2020-14521 2022-02-11 2024-11-21 8.3 7.5 Likely
CVE-2020-14523 2022-02-11 2024-11-21 8.3 7.5 Likely
CVE-2022-25155 2022-04-01 2024-11-21 8.1 6.8 Likely
CVE-2022-25156 2022-04-01 2024-11-21 8.1 6.8 Likely
CVE-2022-25157 2022-04-01 2024-11-21 9.1 6.4 Likely
CVE-2022-25158 2022-04-01 2024-11-21 9.1 6.4 Likely
CVE-2022-25159 2022-04-01 2024-11-21 8.1 6.8 Likely
CVE-2022-25160 2022-04-01 2024-11-21 5.9 4.3 Likely
CVE-2022-25161 2022-05-18 2024-11-21 8.6 7.8 Likely
CVE-2022-25162 2022-05-18 2024-11-21 5.3 5.0 Likely
CVE-2020-14496 2022-05-19 2024-11-21 8.3 7.5 Likely
CVE-2022-24946 2022-06-15 2024-11-21 7.5 7.8 Likely
CVE-2022-33315 2022-07-20 2026-01-09 7.8 - -
CVE-2022-33316 2022-07-20 2026-01-09 7.8 - -
CVE-2022-33317 2022-07-20 2026-01-09 7.8 - -
CVE-2022-33318 2022-07-20 2026-01-09 9.8 - -
CVE-2022-33319 2022-07-20 2026-01-09 8.2 - -
CVE-2022-33320 2022-07-20 2026-01-09 7.8 - -
CVE-2022-33321 2022-11-08 2025-05-01 9.8 - -
CVE-2022-33322 2022-11-08 2025-05-01 6.1 - -
CVE-2022-40266 2022-11-24 2024-11-21 5.3 - -
CVE-2022-25164 2022-11-25 2024-11-21 8.6 - -
CVE-2022-29825 2022-11-25 2025-11-07 5.6 - -
CVE-2022-29826 2022-11-25 2024-11-21 6.8 - -
CVE-2022-29827 2022-11-25 2024-11-21 6.8 - -
CVE-2022-29828 2022-11-25 2024-11-21 6.8 - -
CVE-2022-29829 2022-11-25 2025-11-07 6.8 - -
CVE-2022-29830 2022-11-25 2025-11-07 9.1 - -
CVE-2022-29831 2022-11-25 2024-11-21 7.5 - -
CVE-2022-29832 2022-11-25 2024-11-21 3.7 - -
CVE-2022-29833 2022-11-25 2024-11-21 6.8 - -
CVE-2022-40265 2022-11-30 2024-11-21 8.6 - -
CVE-2022-40267 2023-01-20 2024-11-21 5.9 - -
CVE-2022-33323 2023-02-02 2024-11-21 7.5 - -
CVE-2022-40268 2023-02-02 2024-11-21 6.1 - -
CVE-2022-40269 2023-02-02 2024-11-21 6.8 - -
CVE-2023-0457 2023-03-03 2024-11-21 7.5 - -
CVE-2023-1285 2023-04-14 2024-11-21 7.5 - -
CVE-2023-1618 2023-05-19 2024-11-21 7.5 - -
CVE-2023-1424 2023-05-24 2024-11-21 10.0 - -
CVE-2023-2060 2023-06-02 2024-11-21 7.5 - -
CVE-2023-2061 2023-06-02 2024-11-21 6.2 - -
CVE-2023-2062 2023-06-02 2024-11-21 6.2 - -
CVE-2023-2063 2023-06-02 2024-11-21 6.3 - -
CVE-2023-2846 2023-06-30 2024-11-21 7.5 - -
CVE-2023-3346 2023-08-03 2024-11-21 9.8 - -
CVE-2023-0525 2023-08-04 2024-11-21 7.5 - -
CVE-2023-3373 2023-08-04 2024-11-21 5.9 - -
CVE-2023-4088 2023-09-20 2024-11-21 9.3 - -
CVE-2023-4562 2023-10-13 2024-11-21 9.1 - -
CVE-2023-4625 2023-11-06 2024-11-21 5.3 - -
CVE-2023-4699 2023-11-06 2025-03-17 10.0 - -
CVE-2023-5247 2023-11-30 2024-11-21 7.8 - -
CVE-2023-5274 2023-11-30 2024-11-21 2.5 - -
CVE-2023-5275 2023-11-30 2024-11-21 2.5 - -
CVE-2023-6374 2024-01-30 2024-11-21 5.9 - -
CVE-2023-6942 2024-01-30 2025-09-19 7.5 - -
CVE-2023-6943 2024-01-30 2025-09-19 9.8 - -
CVE-2023-6815 2024-02-13 2024-11-21 6.5 - -
CVE-2023-51776 2024-07-02 2025-03-13 7.8 - -
CVE-2023-51777 2024-07-02 2024-11-21 5.5 - -
CVE-2023-51778 2024-07-02 2025-03-13 5.5 - -
CVE-2024-22102 2024-07-02 2025-03-18 5.5 - -
CVE-2024-22103 2024-07-02 2024-11-21 5.5 - -
CVE-2024-22104 2024-07-02 2024-11-21 5.5 - -
CVE-2024-22105 2024-07-02 2025-03-13 5.5 - -
CVE-2024-22106 2024-07-02 2024-11-21 7.8 - -
CVE-2024-25086 2024-07-02 2024-11-21 7.8 - -
CVE-2024-25087 2024-07-02 2025-03-14 5.5 - -
CVE-2024-25088 2024-07-02 2024-11-21 7.8 - -
CVE-2024-26314 2024-07-02 2025-03-21 7.8 - -
CVE-2024-7587 2024-10-22 2026-01-09 7.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mitsubishielectric by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mitsubishielectric's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.