Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

motorola

About This Vendor

motorola is a technology vendor producing software and infrastructure products. As a software provider, motorola's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of motorola's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 95 known vulnerabilities from motorola. This includes 24 critical-severity issues and 40 high-severity issues that represent significant risk. These vulnerabilities affect 115 distinct products across motorola's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1998 through 2024, indicating decades of continuous security attention and research. Organizations deploying motorola products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0816 1998-05-10 2025-04-03 - 10.0 Likely
CVE-1999-0919 1998-05-10 2025-04-03 - 10.0 Likely
CVE-2002-1944 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1550 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4215 2005-12-14 2025-04-03 - 7.8 Likely
CVE-2006-1365 2006-03-23 2025-04-03 - 5.0 Likely
CVE-2006-1366 2006-03-23 2025-04-03 - 7.8 Likely
CVE-2006-1367 2006-03-23 2025-04-03 - 6.8 Likely
CVE-2006-5196 2006-10-10 2025-04-09 - 7.8 Likely
CVE-2007-0522 2007-01-26 2025-04-09 - 3.3 Unknown
CVE-2007-4220 2007-08-29 2025-04-09 - 7.8 Likely
CVE-2007-4221 2007-08-29 2025-04-09 - 10.0 Likely
CVE-2007-5761 2008-01-09 2025-04-09 - 7.2 Unknown
CVE-2008-2002 2008-04-28 2025-04-09 - 7.8 Likely
CVE-2008-2548 2008-06-04 2025-04-09 - 9.3 Likely
CVE-2009-0392 2009-02-03 2025-04-09 - 6.8 Likely
CVE-2009-0393 2009-02-03 2025-04-09 - 3.5 Unknown
CVE-2009-1394 2009-06-26 2025-04-09 - 9.3 Likely
CVE-2010-2307 2010-06-16 2025-04-11 - 5.0 Likely
CVE-2013-2596 2013-04-13 2025-10-22 7.8 6.9 Unknown
CVE-2013-3051 2013-04-13 2025-04-11 - 6.2 Unknown
CVE-2013-4777 2013-09-25 2025-04-11 - 6.9 Unknown
CVE-2013-5933 2013-09-25 2025-04-11 - 6.9 Unknown
CVE-2015-1495 2015-02-16 2025-04-12 - 6.8 Likely
CVE-2015-1496 2015-02-16 2025-04-12 - 7.2 Unknown
CVE-2015-7935 2015-12-23 2025-04-12 7.5 5.0 Likely
CVE-2015-7936 2015-12-23 2025-04-12 7.5 6.8 Likely
CVE-2017-9493 2017-07-31 2025-04-20 6.3 5.8 Unknown
CVE-2017-9494 2017-07-31 2025-04-20 5.3 5.0 Likely
CVE-2017-9495 2017-07-31 2025-04-20 4.6 2.1 Unknown
CVE-2017-9496 2017-07-31 2025-04-20 6.8 4.6 Unknown
CVE-2017-9497 2017-07-31 2025-04-20 6.8 7.2 Unknown
CVE-2017-9498 2017-07-31 2025-04-20 5.5 2.1 Unknown
CVE-2014-0997 2017-09-26 2025-04-20 7.5 5.0 Likely
CVE-2018-12499 2018-07-02 2024-11-21 7.4 5.8 Likely
CVE-2018-20399 2018-12-23 2024-11-21 9.8 5.0 Likely
CVE-2019-9117 2019-03-07 2024-11-21 9.8 10.0 Likely
CVE-2019-9118 2019-03-07 2024-11-21 9.8 10.0 Likely
CVE-2019-9119 2019-03-07 2024-11-21 9.8 10.0 Likely
CVE-2019-9120 2019-03-07 2024-11-21 9.8 10.0 Likely
CVE-2019-9121 2019-03-07 2024-11-21 9.8 10.0 Likely
CVE-2019-11319 2019-04-18 2024-11-21 9.8 7.5 Likely
CVE-2019-11320 2019-04-18 2024-11-21 9.8 7.5 Likely
CVE-2019-11321 2019-04-18 2024-11-21 5.3 5.0 Likely
CVE-2019-11322 2019-04-18 2024-11-21 9.8 7.5 Likely
CVE-2019-12297 2019-05-23 2024-11-21 9.8 7.5 Likely
CVE-2019-13129 2019-07-01 2024-11-21 7.5 7.8 Likely
CVE-2019-15513 2019-08-23 2024-11-21 7.5 7.8 Likely
CVE-2019-16257 2019-09-12 2024-11-21 9.8 7.5 Likely
CVE-2020-10874 2020-03-23 2024-11-21 7.5 5.0 Likely
CVE-2021-3460 2021-04-13 2024-11-21 8.1 7.5 Likely
CVE-2020-21932 2021-07-21 2024-11-21 5.3 5.0 Likely
CVE-2020-21933 2021-07-21 2024-11-21 7.5 5.0 Likely
CVE-2020-21934 2021-07-21 2024-11-21 7.5 5.0 Likely
CVE-2020-21935 2021-07-21 2024-11-21 9.8 7.5 Likely
CVE-2020-21936 2021-07-21 2024-11-21 5.3 5.0 Likely
CVE-2020-21937 2021-07-21 2024-11-21 9.8 10.0 Likely
CVE-2021-3458 2021-08-17 2024-11-21 6.1 2.1 Unknown
CVE-2021-3459 2021-08-17 2024-11-21 6.8 7.2 Unknown
CVE-2021-38701 2021-12-15 2024-11-21 4.8 3.5 Unknown
CVE-2021-3898 2022-04-22 2024-11-21 6.8 4.3 Likely
CVE-2022-30269 2022-07-26 2024-11-21 8.8 - -
CVE-2022-30270 2022-07-26 2024-11-21 9.8 - -
CVE-2022-30271 2022-07-26 2024-11-21 9.8 - -
CVE-2022-30272 2022-07-26 2024-11-21 7.2 - -
CVE-2022-30274 2022-07-26 2024-11-21 9.8 - -
CVE-2022-30276 2022-07-26 2024-11-21 7.5 - -
CVE-2022-3917 2022-12-14 2024-11-21 4.6 - -
CVE-2022-34885 2023-01-30 2024-11-21 7.2 - -
CVE-2023-31528 2023-05-11 2025-01-27 8.8 - -
CVE-2023-31529 2023-05-11 2025-01-27 8.8 - -
CVE-2023-31530 2023-05-11 2025-01-27 8.8 - -
CVE-2023-31531 2023-05-11 2025-01-27 8.8 - -
CVE-2023-23770 2023-08-29 2024-11-21 9.4 - -
CVE-2023-23771 2023-08-29 2024-11-21 8.4 - -
CVE-2023-23772 2023-08-29 2024-11-21 7.2 - -
CVE-2023-23773 2023-08-29 2024-11-21 7.2 - -
CVE-2023-23774 2023-08-29 2024-11-21 8.4 - -
CVE-2022-3407 2023-09-01 2024-11-21 4.9 - -
CVE-2022-26941 2023-10-19 2024-11-21 9.6 - -
CVE-2022-26942 2023-10-19 2024-11-21 8.2 - -
CVE-2022-26943 2023-10-19 2024-11-21 8.8 - -
CVE-2022-27813 2023-10-19 2024-11-21 8.1 - -
CVE-2022-3681 2023-10-27 2024-11-21 6.5 - -
CVE-2024-23626 2024-01-26 2024-11-21 9.0 7.7 Unknown
CVE-2024-23627 2024-01-26 2024-11-21 9.0 7.7 Unknown
CVE-2024-23628 2024-01-26 2024-11-21 9.0 7.7 Unknown
CVE-2024-23629 2024-01-26 2024-11-21 9.6 7.8 Unknown
CVE-2024-23630 2024-01-26 2024-11-21 9.0 7.7 Unknown
CVE-2024-25360 2024-02-12 2024-11-21 5.3 - -
CVE-2024-38279 2024-06-13 2024-11-21 4.6 - -
CVE-2024-38280 2024-06-13 2024-11-21 4.6 - -
CVE-2024-38281 2024-06-13 2024-11-21 9.8 - -
CVE-2022-4002 2024-07-31 2024-08-13 7.2 - -
CVE-2022-4003 2024-07-31 2024-08-13 2.7 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for motorola by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with motorola's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.