Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

utt

About This Vendor

utt is a technology vendor producing software and infrastructure products. As a software provider, utt's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of utt's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 88 known vulnerabilities from utt. This includes 6 critical-severity issues and 70 high-severity issues that represent significant risk. These vulnerabilities affect 24 distinct products across utt's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2025 through 2026, with recent active disclosure activity. Organizations deploying utt products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2025-6097 2025-06-16 2026-01-08 5.3 5.0 Likely
CVE-2025-6098 2025-06-16 2026-01-08 9.8 10.0 Likely
CVE-2025-6732 2025-06-26 2026-01-08 8.8 9.0 Likely
CVE-2025-6733 2025-06-26 2026-01-08 8.8 9.0 Likely
CVE-2025-6734 2025-06-26 2026-01-08 8.8 9.0 Likely
CVE-2025-7116 2025-07-07 2026-01-14 8.8 9.0 Likely
CVE-2025-7117 2025-07-07 2026-01-08 8.8 9.0 Likely
CVE-2025-7118 2025-07-07 2026-01-08 8.8 9.0 Likely
CVE-2025-7570 2025-07-14 2026-01-08 8.8 9.0 Likely
CVE-2025-7571 2025-07-14 2026-01-08 8.8 9.0 Likely
CVE-2025-10169 2025-09-09 2026-01-08 8.8 9.0 Likely
CVE-2025-10170 2025-09-09 2026-01-08 8.8 9.0 Likely
CVE-2025-10171 2025-09-09 2026-01-08 8.8 9.0 Likely
CVE-2025-10172 2025-09-09 2026-01-12 8.8 9.0 Likely
CVE-2025-10756 2025-09-20 2026-01-08 8.8 9.0 Likely
CVE-2025-10757 2025-09-21 2026-01-08 8.8 9.0 Likely
CVE-2025-10953 2025-09-25 2026-02-10 8.8 9.0 Likely
CVE-2025-11305 2025-10-05 2026-01-08 8.8 9.0 Likely
CVE-2025-11323 2025-10-06 2026-01-08 8.8 9.0 Likely
CVE-2025-11355 2025-10-07 2026-01-08 8.8 9.0 Likely
CVE-2025-11651 2025-10-13 2026-01-08 8.8 9.0 Likely
CVE-2025-11652 2025-10-13 2026-01-08 8.8 9.0 Likely
CVE-2025-11653 2025-10-13 2026-02-10 8.8 9.0 Likely
CVE-2025-13442 2025-11-20 2026-01-08 7.3 7.5 Likely
CVE-2025-14139 2025-12-06 2025-12-12 5.7 5.5 Unknown
CVE-2025-14140 2025-12-06 2025-12-12 6.5 6.8 Likely
CVE-2025-14141 2025-12-06 2025-12-11 8.8 9.0 Likely
CVE-2025-14191 2025-12-07 2026-01-05 8.8 9.0 Likely
CVE-2025-14534 2025-12-11 2026-01-07 9.8 10.0 Likely
CVE-2025-14535 2025-12-11 2026-01-07 9.8 10.0 Likely
CVE-2025-14572 2025-12-12 2026-01-12 8.8 9.0 Likely
CVE-2025-15089 2025-12-25 2025-12-31 8.8 9.0 Likely
CVE-2025-15090 2025-12-25 2025-12-31 8.8 9.0 Likely
CVE-2025-15091 2025-12-26 2025-12-31 8.8 9.0 Likely
CVE-2025-15092 2025-12-26 2025-12-31 8.8 9.0 Likely
CVE-2025-15428 2026-01-02 2026-01-12 8.8 9.0 Likely
CVE-2025-15429 2026-01-02 2026-01-12 8.8 9.0 Likely
CVE-2025-15430 2026-01-02 2026-02-23 8.8 9.0 Likely
CVE-2025-15431 2026-01-02 2026-02-23 8.8 9.0 Likely
CVE-2025-15459 2026-01-05 2026-01-12 8.8 9.0 Likely
CVE-2025-15460 2026-01-05 2026-01-12 8.8 9.0 Likely
CVE-2025-15461 2026-01-05 2026-01-12 8.8 9.0 Likely
CVE-2025-15462 2026-01-05 2026-01-12 8.8 9.0 Likely
CVE-2026-0836 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-0837 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-0838 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-0839 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-0840 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-0841 2026-01-11 2026-01-13 8.8 9.0 Likely
CVE-2026-1137 2026-01-19 2026-02-04 8.8 9.0 Likely
CVE-2026-1138 2026-01-19 2026-02-04 8.8 9.0 Likely
CVE-2026-1139 2026-01-19 2026-02-04 8.8 9.0 Likely
CVE-2026-1140 2026-01-19 2026-02-04 8.8 9.0 Likely
CVE-2026-1162 2026-01-19 2026-02-06 9.8 10.0 Likely
CVE-2026-2066 2026-02-06 2026-02-10 8.8 9.0 Likely
CVE-2026-2067 2026-02-06 2026-02-10 8.8 9.0 Likely
CVE-2026-2068 2026-02-06 2026-02-13 8.8 9.0 Likely
CVE-2026-2070 2026-02-06 2026-02-13 8.8 9.0 Likely
CVE-2026-2071 2026-02-07 2026-02-13 8.8 9.0 Likely
CVE-2026-2080 2026-02-07 2026-02-13 7.2 8.3 Unknown
CVE-2026-2086 2026-02-07 2026-02-24 8.8 9.0 Likely
CVE-2026-2118 2026-02-08 2026-02-13 7.2 8.3 Unknown
CVE-2026-2135 2026-02-08 2026-02-13 6.3 6.5 Likely
CVE-2026-2182 2026-02-08 2026-02-10 7.2 8.3 Unknown
CVE-2026-2188 2026-02-08 2026-02-10 7.2 8.3 Unknown
CVE-2025-70998 2026-02-18 2026-02-19 9.8 - -
CVE-2026-2846 2026-02-20 2026-02-24 7.2 8.3 Unknown
CVE-2026-2847 2026-02-20 2026-02-24 7.2 8.3 Unknown
CVE-2026-2904 2026-02-22 2026-02-24 8.8 9.0 Likely
CVE-2026-2935 2026-02-22 2026-02-24 7.2 8.3 Unknown
CVE-2026-2980 2026-02-23 2026-02-24 7.2 8.3 Unknown
CVE-2026-2981 2026-02-23 2026-02-24 8.8 9.0 Likely
CVE-2026-3015 2026-02-23 2026-02-24 8.8 9.0 Likely
CVE-2026-3016 2026-02-23 2026-02-24 8.8 9.0 Likely
CVE-2026-3698 2026-03-08 2026-03-10 8.8 9.0 Likely
CVE-2026-3699 2026-03-08 2026-03-10 8.8 9.0 Likely
CVE-2026-3700 2026-03-08 2026-03-10 8.8 9.0 Likely
CVE-2026-3814 2026-03-09 2026-03-10 8.8 9.0 Likely
CVE-2026-3815 2026-03-09 2026-03-10 8.8 9.0 Likely
CVE-2026-31058 2026-04-06 2026-04-10 4.5 - -
CVE-2026-31059 2026-04-06 2026-04-09 9.8 - -
CVE-2026-31060 2026-04-06 2026-04-10 4.5 - -
CVE-2026-31061 2026-04-06 2026-04-10 4.5 - -
CVE-2026-31062 2026-04-06 2026-04-07 4.5 - -
CVE-2026-31063 2026-04-06 2026-04-10 4.5 - -
CVE-2026-31065 2026-04-06 2026-04-07 4.5 - -
CVE-2026-31066 2026-04-06 2026-04-10 4.5 - -
CVE-2026-31067 2026-04-06 2026-04-07 6.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for utt by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with utt's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.