Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

philips

About This Vendor

philips is a technology vendor producing software and infrastructure products. As a software provider, philips's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of philips's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 107 known vulnerabilities from philips. This includes 9 critical-severity issues and 42 high-severity issues that represent significant risk. These vulnerabilities affect 204 distinct products across philips's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2013 through 2025, indicating decades of continuous security attention and research. Organizations deploying philips products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-2808 2013-10-05 2025-04-11 - 9.3 Likely
CVE-2017-0143 2017-03-17 2026-04-22 8.8 9.3 Likely
CVE-2015-2882 2017-04-10 2025-04-20 9.8 10.0 Likely
CVE-2015-2883 2017-04-10 2025-04-20 5.4 3.5 Unknown
CVE-2015-2884 2017-04-10 2025-04-20 7.5 5.0 Likely
CVE-2017-0199 2017-04-12 2026-04-22 7.8 9.3 Likely
CVE-2017-14797 2017-10-01 2025-04-20 7.5 7.9 Unknown
CVE-2017-14111 2017-11-17 2025-04-20 7.2 4.0 Likely
CVE-2018-5438 2018-03-20 2024-11-21 6.3 3.3 Unknown
CVE-2018-5454 2018-03-26 2024-11-21 8.1 6.8 Likely
CVE-2018-5458 2018-03-26 2024-11-21 7.5 5.0 Likely
CVE-2018-5462 2018-03-26 2024-11-21 7.5 5.0 Likely
CVE-2018-5464 2018-03-26 2024-11-21 7.5 5.0 Likely
CVE-2018-5466 2018-03-26 2024-11-21 7.5 5.0 Likely
CVE-2018-5468 2018-03-26 2024-11-21 9.8 7.5 Likely
CVE-2018-5470 2018-03-26 2024-11-21 7.8 7.2 Unknown
CVE-2018-5472 2018-03-26 2024-11-21 9.8 7.5 Likely
CVE-2018-5474 2018-03-26 2024-11-21 9.8 7.5 Likely
CVE-2018-5451 2018-03-28 2024-11-21 9.8 7.5 Likely
CVE-2018-7498 2018-03-28 2024-11-21 9.8 5.0 Likely
CVE-2017-9654 2018-04-24 2024-11-21 8.8 4.0 Likely
CVE-2017-9656 2018-04-24 2024-11-21 9.1 6.5 Likely
CVE-2017-9657 2018-04-30 2024-11-21 6.5 3.3 Unknown
CVE-2017-9658 2018-04-30 2024-11-21 6.5 6.1 Unknown
CVE-2018-8853 2018-05-04 2024-11-21 8.8 7.2 Unknown
CVE-2018-8857 2018-05-04 2024-11-21 7.8 7.2 Unknown
CVE-2018-8861 2018-05-04 2024-11-21 8.7 6.8 Unknown
CVE-2018-10597 2018-06-05 2024-11-21 8.3 5.4 Unknown
CVE-2018-10599 2018-06-05 2024-11-21 5.3 2.9 Unknown
CVE-2018-10601 2018-06-05 2024-11-21 8.2 5.4 Unknown
CVE-2017-3210 2018-07-24 2024-11-21 7.8 7.2 Unknown
CVE-2018-14787 2018-08-22 2024-11-21 7.8 4.6 Unknown
CVE-2018-14789 2018-08-22 2024-11-21 6.7 4.6 Unknown
CVE-2018-14799 2018-08-22 2024-11-21 3.7 4.6 Unknown
CVE-2018-14801 2018-08-22 2024-11-21 6.2 7.2 Unknown
CVE-2018-14803 2018-09-26 2024-11-21 5.3 5.0 Likely
CVE-2018-8842 2018-09-26 2024-11-21 8.8 3.3 Unknown
CVE-2018-8844 2018-09-26 2024-11-21 8.8 6.8 Likely
CVE-2018-8846 2018-09-26 2024-11-21 6.1 4.3 Likely
CVE-2018-8848 2018-09-26 2024-11-21 7.5 5.0 Likely
CVE-2018-8850 2018-09-26 2024-11-21 9.8 7.5 Likely
CVE-2018-8852 2018-09-26 2024-11-21 8.8 6.8 Likely
CVE-2018-8854 2018-09-26 2024-11-21 7.5 5.0 Likely
CVE-2018-8856 2018-09-26 2024-11-21 9.8 5.0 Likely
CVE-2018-17906 2018-11-19 2024-11-21 8.8 3.3 Unknown
CVE-2018-19001 2018-12-07 2024-11-21 4.3 4.6 Unknown
CVE-2019-6562 2019-05-01 2024-11-21 5.4 3.5 Unknown
CVE-2019-10968 2019-07-24 2024-11-21 4.4 2.1 Unknown
CVE-2019-10988 2019-09-04 2024-11-21 3.4 3.6 Unknown
CVE-2019-13530 2019-09-12 2024-11-21 7.2 6.5 Likely
CVE-2019-13534 2019-09-12 2024-11-21 7.2 6.5 Likely
CVE-2019-13546 2019-10-25 2024-11-21 6.8 7.2 Unknown
CVE-2019-13557 2019-11-08 2024-11-21 5.3 5.0 Likely
CVE-2019-18980 2019-11-14 2024-11-21 7.5 5.0 Likely
CVE-2019-18241 2019-11-26 2024-11-21 6.5 3.3 Unknown
CVE-2019-18263 2019-12-20 2024-11-21 6.5 3.3 Unknown
CVE-2020-6007 2020-01-23 2024-11-21 7.9 4.3 Unknown
CVE-2020-12023 2020-06-11 2025-06-04 2.0 2.7 Unknown
CVE-2020-14477 2020-06-26 2025-06-04 3.6 3.6 Unknown
CVE-2020-7360 2020-08-13 2024-11-21 7.4 6.9 Unknown
CVE-2020-14518 2020-08-21 2025-06-04 5.3 5.0 Likely
CVE-2020-16237 2020-08-21 2025-06-04 2.1 2.1 Unknown
CVE-2020-16239 2020-08-21 2025-06-04 4.9 4.0 Likely
CVE-2020-16241 2020-08-21 2025-06-04 6.3 2.1 Unknown
CVE-2020-11617 2020-08-31 2024-11-21 5.9 4.3 Likely
CVE-2020-11618 2020-08-31 2024-11-21 7.8 7.2 Unknown
CVE-2020-16214 2020-09-11 2026-02-23 5.0 5.8 Likely
CVE-2020-16218 2020-09-11 2026-02-23 3.5 2.7 Unknown
CVE-2020-16222 2020-09-11 2026-02-23 8.8 5.8 Unknown
CVE-2020-16228 2020-09-11 2026-02-23 6.4 5.2 Unknown
CVE-2020-16212 2020-09-11 2024-11-21 6.8 4.6 Unknown
CVE-2020-16216 2020-09-11 2026-02-23 6.5 6.1 Unknown
CVE-2020-16220 2020-09-11 2026-02-23 4.3 3.3 Unknown
CVE-2020-16224 2020-09-11 2026-02-23 6.5 3.3 Unknown
CVE-2020-14506 2020-09-18 2025-06-04 3.4 4.3 Likely
CVE-2020-14525 2020-09-18 2025-06-04 3.5 2.7 Unknown
CVE-2020-16198 2020-09-18 2025-06-04 5.0 5.8 Unknown
CVE-2020-16200 2020-09-18 2025-06-04 6.5 3.3 Unknown
CVE-2020-16247 2020-09-18 2025-06-04 6.8 3.6 Unknown
CVE-2018-7580 2020-12-21 2024-11-21 7.5 5.0 Likely
CVE-2020-27298 2021-01-26 2025-06-04 6.5 3.3 Unknown
CVE-2021-39375 2021-08-24 2024-11-21 8.8 6.5 Likely
CVE-2021-39376 2021-08-24 2024-11-21 8.8 6.5 Likely
CVE-2021-26248 2021-11-19 2026-04-02 5.5 2.1 Unknown
CVE-2021-26262 2021-11-19 2026-04-02 5.5 5.0 Likely
CVE-2021-42744 2021-11-19 2026-04-02 5.5 2.1 Unknown
CVE-2021-32993 2021-12-27 2024-11-21 8.1 5.8 Unknown
CVE-2021-33017 2021-12-27 2024-11-21 8.1 5.8 Unknown
CVE-2021-43548 2021-12-27 2024-11-21 6.5 3.3 Unknown
CVE-2021-43550 2021-12-27 2024-11-21 5.9 3.3 Unknown
CVE-2021-43552 2021-12-27 2024-11-21 6.1 2.1 Unknown
CVE-2021-23173 2022-01-10 2024-11-21 2.6 4.0 Likely
CVE-2021-27493 2022-04-01 2025-04-17 6.1 6.4 Likely
CVE-2021-27497 2022-04-01 2025-04-17 6.5 7.5 Likely
CVE-2021-27501 2022-04-01 2024-11-21 7.5 7.5 Likely
CVE-2021-33018 2022-04-01 2024-11-21 7.5 5.0 Likely
CVE-2021-33020 2022-04-01 2024-11-21 8.2 5.0 Likely
CVE-2021-33022 2022-04-01 2024-11-21 7.5 5.0 Likely
CVE-2021-33024 2022-04-01 2024-11-21 3.7 5.0 Likely
CVE-2022-0922 2022-04-01 2024-11-21 6.5 5.7 Unknown
CVE-2021-32966 2022-05-25 2024-11-21 3.7 4.3 Likely
CVE-2021-39369 2022-12-26 2025-04-14 6.5 - -
CVE-2018-8863 2023-11-09 2024-11-21 5.9 - -
CVE-2023-40704 2024-07-18 2025-04-09 6.8 - -
CVE-2025-27953 2025-06-02 2025-06-13 6.5 - -
CVE-2025-27954 2025-06-02 2025-06-13 6.5 - -
CVE-2025-27955 2025-06-02 2025-06-13 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for philips by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with philips's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.