Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

nortel

About This Vendor

nortel is a technology vendor producing software and infrastructure products. As a software provider, nortel's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of nortel's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 44 known vulnerabilities from nortel. This includes 23 high-severity issues requiring prompt remediation. These vulnerabilities affect 161 distinct products across nortel's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2009, indicating decades of continuous security attention and research. Organizations deploying nortel products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0009 1999-12-29 2025-04-03 - 7.2 Unknown
CVE-2000-0063 2000-01-17 2025-04-03 - 5.0 Likely
CVE-2000-0064 2000-01-17 2025-04-03 - 5.0 Likely
CVE-2000-0221 2000-02-25 2025-04-03 - 5.0 Likely
CVE-2002-0209 2002-05-16 2025-04-03 - 5.0 Likely
CVE-2002-0540 2002-07-03 2025-04-03 - 7.5 Likely
CVE-2003-1115 2003-12-31 2025-04-03 - 7.5 Likely
CVE-2004-0056 2004-02-17 2025-04-03 - 7.5 Likely
CVE-2004-0839 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-1319 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1305 2004-12-23 2025-04-03 - 5.0 Likely
CVE-2004-2549 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-2621 2004-12-31 2025-04-03 - 4.0 Unknown
CVE-2004-1105 2005-01-10 2025-04-03 - 5.0 Likely
CVE-2005-0844 2005-05-02 2025-04-03 - 4.6 Unknown
CVE-2005-1802 2005-05-27 2025-04-03 - 5.0 Likely
CVE-2005-0356 2005-05-31 2025-04-03 - 5.0 Likely
CVE-2005-2579 2005-08-16 2025-04-03 - 7.2 Unknown
CVE-2005-4197 2005-12-13 2025-04-03 - 7.5 Likely
CVE-2006-6670 2006-12-20 2025-04-09 - 10.0 Likely
CVE-2007-1057 2007-02-21 2025-04-09 - 6.9 Unknown
CVE-2007-1820 2007-04-02 2025-04-09 - 9.3 Likely
CVE-2007-2332 2007-04-27 2025-04-09 - 9.0 Likely
CVE-2007-2333 2007-04-27 2025-04-09 - 10.0 Likely
CVE-2007-2334 2007-04-27 2025-04-09 - 7.5 Likely
CVE-2007-2886 2007-05-30 2025-04-09 - 5.0 Likely
CVE-2007-3361 2007-06-22 2025-04-09 - 7.8 Likely
CVE-2007-3438 2007-06-27 2025-04-09 - 7.8 Likely
CVE-2007-5591 2007-10-19 2025-04-09 - 7.8 Likely
CVE-2007-5636 2007-10-23 2025-04-09 - 7.5 Likely
CVE-2007-5637 2007-10-23 2025-04-09 - 4.3 Likely
CVE-2007-5638 2007-10-23 2025-04-09 - 4.3 Likely
CVE-2007-5639 2007-10-23 2025-04-09 - 7.1 Likely
CVE-2007-5640 2007-10-23 2025-04-09 - 7.1 Likely
CVE-2008-2218 2008-05-14 2025-04-09 - 5.0 Likely
CVE-2008-3157 2008-07-11 2025-04-09 - 5.0 Likely
CVE-2008-4999 2008-11-07 2025-04-09 - 7.8 Likely
CVE-2008-5871 2009-01-08 2025-04-09 - 6.4 Likely
CVE-2008-5872 2009-01-08 2025-04-09 - 7.8 Likely
CVE-2008-6564 2009-03-31 2025-04-09 - 7.6 Unknown
CVE-2008-6576 2009-04-01 2025-04-09 - 7.8 Likely
CVE-2008-6577 2009-04-01 2025-04-09 - 10.0 Likely
CVE-2008-6578 2009-04-01 2025-04-09 - 10.0 Likely
CVE-2008-6579 2009-04-01 2025-04-09 - 5.0 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for nortel by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with nortel's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.