Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

netiq

About This Vendor

netiq is a technology vendor producing software and infrastructure products. As a software provider, netiq's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of netiq's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 70 known vulnerabilities from netiq. This includes 5 critical-severity issues and 14 high-severity issues that represent significant risk. These vulnerabilities affect 13 distinct products across netiq's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2005 through 2024, indicating decades of continuous security attention and research. Organizations deploying netiq products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-1244 2005-04-20 2025-04-03 - 7.5 Likely
CVE-2006-4506 2006-08-31 2025-04-03 - 3.6 Unknown
CVE-2006-4803 2006-09-14 2025-04-03 - 7.2 Unknown
CVE-2007-4526 2007-08-25 2025-04-09 - 2.1 Unknown
CVE-2014-4509 2014-06-21 2025-04-12 - 4.6 Unknown
CVE-2016-1605 2016-08-01 2025-04-12 6.5 6.8 Likely
CVE-2015-0787 2016-10-27 2025-04-12 6.1 4.3 Likely
CVE-2016-1592 2016-10-27 2025-04-12 6.1 4.3 Likely
CVE-2016-1597 2017-03-23 2025-04-20 8.8 9.0 Likely
CVE-2016-5748 2017-03-23 2025-04-20 5.5 2.1 Unknown
CVE-2016-5749 2017-03-23 2025-04-20 5.5 2.1 Unknown
CVE-2016-5750 2017-03-23 2025-04-20 8.8 6.5 Likely
CVE-2016-5751 2017-03-23 2025-04-20 6.1 4.3 Likely
CVE-2016-5752 2017-03-23 2025-04-20 7.5 5.0 Likely
CVE-2016-5754 2017-03-23 2025-04-20 7.5 5.0 Likely
CVE-2016-5755 2017-03-23 2025-04-20 6.5 4.3 Likely
CVE-2016-5756 2017-03-23 2025-04-20 6.1 4.3 Likely
CVE-2016-5757 2017-03-23 2025-04-20 9.8 7.5 Likely
CVE-2016-5758 2017-03-23 2025-04-20 8.8 6.8 Likely
CVE-2017-5190 2017-04-20 2025-04-20 3.1 3.5 Unknown
CVE-2017-5183 2017-04-20 2025-04-20 6.1 4.3 Likely
CVE-2017-5191 2017-04-24 2025-04-20 6.1 4.3 Likely
CVE-2017-5186 2017-04-27 2025-04-20 7.5 4.3 Likely
CVE-2017-7428 2017-05-03 2025-04-20 5.3 5.0 Likely
CVE-2017-7430 2017-05-03 2025-04-20 6.1 4.3 Likely
CVE-2017-7431 2017-05-03 2025-04-20 8.8 6.8 Likely
CVE-2017-7432 2017-05-03 2025-04-20 9.8 7.5 Likely
CVE-2017-7425 2017-11-06 2025-04-20 7.6 4.3 Likely
CVE-2017-14803 2018-01-20 2024-11-21 9.8 10.0 Likely
CVE-2018-1342 2018-01-26 2024-11-21 9.8 7.5 Likely
CVE-2017-14799 2018-03-01 2024-11-21 4.6 4.3 Likely
CVE-2017-14800 2018-03-01 2024-11-21 5.4 4.3 Likely
CVE-2017-7426 2018-03-01 2024-11-21 5.4 6.4 Likely
CVE-2017-14801 2018-03-02 2024-11-21 4.6 4.3 Likely
CVE-2017-14802 2018-03-02 2024-11-21 5.4 5.8 Likely
CVE-2017-5189 2018-03-02 2024-11-21 4.3 5.0 Likely
CVE-2017-7419 2018-03-02 2024-11-21 4.6 4.3 Likely
CVE-2017-7429 2018-03-02 2024-11-21 8.8 6.5 Likely
CVE-2017-7434 2018-03-02 2024-11-21 3.3 5.0 Likely
CVE-2017-7438 2018-03-02 2024-11-21 4.6 4.3 Likely
CVE-2017-9276 2018-03-02 2024-11-21 5.4 4.3 Likely
CVE-2017-9278 2018-03-02 2024-11-21 3.3 5.0 Likely
CVE-2017-9279 2018-03-02 2024-11-21 2.0 9.0 Likely
CVE-2017-9280 2018-03-02 2024-11-21 4.3 5.0 Likely
CVE-2017-9285 2018-03-02 2024-11-21 5.4 7.5 Likely
CVE-2017-7427 2018-03-05 2024-11-21 5.4 4.3 Likely
CVE-2017-7437 2018-03-05 2024-11-21 4.6 4.3 Likely
CVE-2018-1343 2018-03-06 2024-11-21 9.8 7.5 Likely
CVE-2018-7677 2018-03-14 2024-11-21 3.5 6.8 Likely
CVE-2018-7678 2018-03-14 2024-11-21 3.5 3.5 Unknown
CVE-2018-1344 2018-03-21 2024-11-21 3.1 5.0 Likely
CVE-2018-1345 2018-03-21 2024-11-21 5.9 6.5 Likely
CVE-2018-1346 2018-03-21 2024-11-21 3.1 5.0 Likely
CVE-2018-1347 2018-03-21 2024-11-21 5.3 4.3 Likely
CVE-2018-1348 2018-03-26 2024-11-21 5.3 5.8 Likely
CVE-2018-1349 2018-03-26 2024-11-21 2.3 5.0 Likely
CVE-2018-1350 2018-03-26 2024-11-21 2.3 5.0 Likely
CVE-2018-7673 2018-03-26 2024-11-21 5.1 5.0 Likely
CVE-2018-7674 2018-03-28 2024-11-21 2.1 5.8 Likely
CVE-2018-7676 2018-03-28 2024-11-21 3.9 4.3 Likely
CVE-2017-9275 2018-04-26 2024-11-21 2.8 4.3 Likely
CVE-2017-9284 2018-04-26 2024-11-21 4.8 5.0 Likely
CVE-2018-12461 2018-07-10 2024-11-21 3.5 5.0 Likely
CVE-2018-12462 2018-07-10 2024-11-21 4.8 4.3 Likely
CVE-2019-11648 2019-06-24 2024-11-21 7.5 5.0 Likely
CVE-2022-26329 2023-01-26 2024-11-21 1.8 - -
CVE-2022-38758 2023-01-26 2024-11-21 7.2 - -
CVE-2024-1470 2024-02-29 2025-02-14 7.1 - -
CVE-2020-11843 2024-06-11 2024-11-21 6.5 - -
CVE-2022-26322 2024-09-12 2024-10-02 4.9 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for netiq by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with netiq's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.