Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

tcl

About This Vendor

tcl is a technology vendor producing software and infrastructure products. As a software provider, tcl's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of tcl's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 50 known vulnerabilities from tcl. This includes 38 critical-severity issues and 9 high-severity issues that represent significant risk. These vulnerabilities affect 25 distinct products across tcl's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2025, indicating decades of continuous security attention and research. Organizations deploying tcl products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-4772 2008-01-09 2026-04-23 - 4.0 Likely
CVE-2019-7163 2019-08-02 2024-11-21 9.8 7.5 Likely
CVE-2020-27403 2020-11-10 2024-11-21 6.5 3.3 Unknown
CVE-2020-28055 2020-11-10 2024-11-21 7.8 7.2 Unknown
CVE-2021-35331 2021-07-05 2024-11-21 7.8 6.8 Likely
CVE-2022-21178 2022-08-05 2024-11-21 9.8 - -
CVE-2022-21201 2022-08-05 2024-11-21 8.8 - -
CVE-2022-22140 2022-08-05 2024-11-21 9.8 - -
CVE-2022-22144 2022-08-05 2024-11-21 9.8 - -
CVE-2022-23103 2022-08-05 2024-11-21 9.8 - -
CVE-2022-23399 2022-08-05 2024-11-21 9.8 - -
CVE-2022-23918 2022-08-05 2024-11-21 9.8 - -
CVE-2022-23919 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24005 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24006 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24007 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24008 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24009 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24010 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24011 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24012 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24013 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24014 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24015 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24016 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24017 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24018 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24019 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24020 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24021 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24022 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24023 2022-08-05 2024-11-21 8.8 - -
CVE-2022-24024 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24025 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24026 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24027 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24028 2022-08-05 2024-11-21 9.8 - -
CVE-2022-24029 2022-08-05 2024-11-21 9.8 - -
CVE-2022-25996 2022-08-05 2024-11-21 9.8 - -
CVE-2022-26009 2022-08-05 2024-11-21 9.8 - -
CVE-2022-26342 2022-08-05 2024-11-21 9.8 - -
CVE-2022-26346 2022-08-05 2024-11-21 9.8 - -
CVE-2022-27178 2022-08-05 2024-11-21 9.8 - -
CVE-2022-27185 2022-08-05 2024-11-21 7.5 - -
CVE-2022-27630 2022-08-05 2024-11-21 7.5 - -
CVE-2022-27633 2022-08-05 2024-11-21 7.5 - -
CVE-2022-27660 2022-08-05 2024-11-21 7.5 - -
CVE-2023-43481 2023-12-27 2024-11-21 9.8 - -
CVE-2025-55971 2025-10-03 2025-10-15 4.7 - -
CVE-2025-55972 2025-10-03 2025-10-16 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for tcl by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with tcl's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.