Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

sick

About This Vendor

sick is a technology vendor producing software and infrastructure products. As a software provider, sick's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of sick's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 124 known vulnerabilities from sick. This includes 19 critical-severity issues and 37 high-severity issues that represent significant risk. These vulnerabilities affect 291 distinct products across sick's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2019 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying sick products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-10979 2019-07-01 2024-11-21 9.8 7.5 Likely
CVE-2019-14753 2019-09-24 2024-11-21 7.5 5.0 Likely
CVE-2020-2076 2020-07-29 2024-11-21 9.8 7.5 Likely
CVE-2020-2077 2020-07-29 2024-11-21 7.5 5.0 Likely
CVE-2020-2078 2020-07-29 2024-11-21 6.5 4.0 Likely
CVE-2020-2075 2020-08-31 2024-11-21 7.5 5.0 Likely
CVE-2021-32496 2021-06-28 2024-11-21 5.3 3.5 Unknown
CVE-2021-32497 2021-12-17 2024-11-21 8.6 9.3 Likely
CVE-2021-32498 2021-12-17 2024-11-21 8.6 9.3 Likely
CVE-2021-32499 2021-12-17 2024-11-21 7.5 5.0 Likely
CVE-2021-32503 2022-04-01 2024-11-21 4.9 4.0 Likely
CVE-2022-27577 2022-04-11 2024-11-21 9.1 6.4 Likely
CVE-2022-27578 2022-04-11 2024-11-21 7.8 4.6 Unknown
CVE-2021-32504 2022-07-19 2024-11-21 5.3 - -
CVE-2022-27579 2022-07-19 2024-11-21 7.8 - -
CVE-2022-27580 2022-07-19 2024-11-21 7.8 - -
CVE-2022-27583 2022-10-31 2025-05-07 9.1 - -
CVE-2022-27582 2022-11-01 2025-05-06 9.8 - -
CVE-2022-27584 2022-11-01 2025-05-06 9.8 - -
CVE-2022-27585 2022-11-01 2025-05-02 9.8 - -
CVE-2022-27586 2022-11-01 2025-05-06 9.8 - -
CVE-2022-43989 2022-11-01 2025-05-05 7.3 - -
CVE-2022-43990 2022-11-01 2025-05-05 7.3 - -
CVE-2022-27581 2022-12-13 2025-04-22 6.5 - -
CVE-2022-46832 2022-12-13 2025-04-21 6.5 - -
CVE-2022-46833 2022-12-13 2025-04-22 6.5 - -
CVE-2022-46834 2022-12-13 2025-04-22 6.5 - -
CVE-2022-47377 2022-12-16 2025-04-16 9.8 - -
CVE-2023-23452 2023-02-20 2025-03-18 9.8 - -
CVE-2023-23453 2023-02-20 2025-03-18 9.8 - -
CVE-2023-23451 2023-04-19 2025-02-05 9.8 - -
CVE-2023-23444 2023-05-12 2025-01-24 7.5 - -
CVE-2023-23445 2023-05-15 2024-11-21 7.5 - -
CVE-2023-23446 2023-05-15 2024-11-21 7.5 - -
CVE-2023-23447 2023-05-15 2024-11-21 7.5 - -
CVE-2023-23448 2023-05-15 2024-11-21 5.3 - -
CVE-2023-23449 2023-05-15 2024-11-21 5.3 - -
CVE-2023-23450 2023-05-15 2024-11-21 6.2 - -
CVE-2023-31408 2023-05-15 2024-11-21 5.3 - -
CVE-2023-31409 2023-05-15 2024-11-21 5.3 - -
CVE-2023-31410 2023-06-19 2024-11-21 9.8 - -
CVE-2023-31411 2023-06-19 2024-11-21 9.8 - -
CVE-2023-35696 2023-07-10 2024-11-21 7.5 - -
CVE-2023-35697 2023-07-10 2024-11-21 5.3 - -
CVE-2023-35698 2023-07-10 2024-11-21 5.3 - -
CVE-2023-35699 2023-07-10 2024-11-21 5.3 - -
CVE-2023-3270 2023-07-10 2024-11-21 8.6 - -
CVE-2023-3271 2023-07-10 2024-11-21 8.2 - -
CVE-2023-3272 2023-07-10 2024-11-21 7.5 - -
CVE-2023-3273 2023-07-10 2024-11-21 7.5 - -
CVE-2023-31412 2023-08-24 2024-11-21 7.5 - -
CVE-2023-4418 2023-08-24 2024-11-21 7.5 - -
CVE-2023-4419 2023-08-24 2024-11-21 9.8 - -
CVE-2023-4420 2023-08-24 2024-11-21 9.8 - -
CVE-2023-5288 2023-09-29 2024-11-21 9.8 - -
CVE-2023-43696 2023-10-09 2024-11-21 8.2 - -
CVE-2023-43699 2023-10-09 2024-11-21 7.5 - -
CVE-2023-43700 2023-10-09 2024-11-21 7.7 - -
CVE-2023-43697 2023-10-09 2024-11-21 6.5 - -
CVE-2023-43698 2023-10-09 2024-11-21 7.1 - -
CVE-2023-5100 2023-10-09 2024-11-21 5.9 - -
CVE-2023-5101 2023-10-09 2024-11-21 5.3 - -
CVE-2023-5102 2023-10-09 2024-11-21 5.3 - -
CVE-2023-5103 2023-10-09 2024-11-21 4.3 - -
CVE-2023-5246 2023-10-23 2024-11-21 8.8 - -
CVE-2025-49181 2025-06-12 2026-02-03 8.6 - -
CVE-2025-49182 2025-06-12 2026-01-29 7.5 - -
CVE-2025-49183 2025-06-12 2026-01-29 7.5 - -
CVE-2025-49184 2025-06-12 2026-01-29 7.5 - -
CVE-2025-49185 2025-06-12 2026-01-29 5.5 - -
CVE-2025-49186 2025-06-12 2026-02-03 5.3 - -
CVE-2025-49187 2025-06-12 2026-01-29 5.3 - -
CVE-2025-49188 2025-06-12 2026-01-29 5.3 - -
CVE-2025-49189 2025-06-12 2026-02-06 5.3 - -
CVE-2025-49190 2025-06-12 2026-01-29 4.3 - -
CVE-2025-49191 2025-06-12 2026-01-29 4.8 - -
CVE-2025-49192 2025-06-12 2026-02-06 4.3 - -
CVE-2025-49193 2025-06-12 2026-01-26 4.2 - -
CVE-2025-49194 2025-06-12 2026-01-26 7.5 - -
CVE-2025-49195 2025-06-12 2026-01-26 5.3 - -
CVE-2025-49196 2025-06-12 2026-01-26 6.5 - -
CVE-2025-49197 2025-06-12 2026-01-26 6.5 - -
CVE-2025-49198 2025-06-12 2026-01-26 3.1 - -
CVE-2025-49199 2025-06-12 2026-01-26 8.8 - -
CVE-2025-49200 2025-06-12 2026-01-26 6.5 - -
CVE-2025-58578 2025-10-06 2026-01-27 3.8 - -
CVE-2025-58579 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58580 2025-10-06 2026-01-27 6.5 - -
CVE-2025-58581 2025-10-06 2026-01-27 4.3 - -
CVE-2025-58582 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58583 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58584 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58585 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58586 2025-10-06 2026-01-27 5.3 - -
CVE-2025-58587 2025-10-06 2026-01-27 6.5 - -
CVE-2025-58589 2025-10-06 2026-01-27 2.7 - -
CVE-2025-58590 2025-10-06 2026-01-27 6.5 - -
CVE-2025-58591 2025-10-06 2026-01-27 6.5 - -
CVE-2025-9913 2025-10-06 2026-01-29 4.5 - -
CVE-2025-9914 2025-10-06 2026-01-29 4.3 - -
CVE-2025-59459 2025-10-27 2025-11-03 5.5 - -
CVE-2025-59460 2025-10-27 2025-11-03 7.5 - -
CVE-2025-59461 2025-10-27 2025-11-03 7.6 - -
CVE-2025-59462 2025-10-27 2025-11-03 6.5 - -
CVE-2025-59463 2025-10-27 2025-11-03 4.3 - -
CVE-2026-22907 2026-01-15 2026-01-23 9.9 - -
CVE-2026-22908 2026-01-15 2026-01-23 9.1 - -
CVE-2026-22909 2026-01-15 2026-01-23 7.5 - -
CVE-2026-22910 2026-01-15 2026-01-23 7.5 - -
CVE-2026-22911 2026-01-15 2026-01-23 5.3 - -
CVE-2026-22912 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22913 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22914 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22915 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22916 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22917 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22918 2026-01-15 2026-01-23 4.3 - -
CVE-2026-22919 2026-01-15 2026-01-23 3.8 - -
CVE-2026-22920 2026-01-15 2026-01-23 3.7 - -
CVE-2026-22644 2026-01-15 2026-01-29 5.3 - -
CVE-2026-22645 2026-01-15 2026-01-29 5.3 - -
CVE-2026-22646 2026-01-15 2026-01-29 4.3 - -
CVE-2026-1626 2026-02-27 2026-03-05 6.5 - -
CVE-2026-1627 2026-02-27 2026-03-05 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for sick by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with sick's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.