Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

wegia

About This Vendor

wegia is a technology vendor producing software and infrastructure products. As a software provider, wegia's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of wegia's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 178 known vulnerabilities from wegia. This includes 48 critical-severity issues and 43 high-severity issues that represent significant risk. These vulnerabilities affect 1 distinct product across wegia's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2024 through 2026, with recent active disclosure activity. Organizations deploying wegia products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2024-53470 2024-12-05 2025-04-09 6.1 - -
CVE-2024-53471 2024-12-05 2025-04-09 6.1 - -
CVE-2024-53472 2024-12-05 2025-04-09 8.8 - -
CVE-2024-53473 2024-12-07 2025-04-09 7.5 - -
CVE-2025-22132 2025-01-07 2025-02-13 8.3 - -
CVE-2025-22133 2025-01-07 2025-04-09 9.9 - -
CVE-2025-22139 2025-01-08 2025-04-09 6.1 - -
CVE-2025-22140 2025-01-08 2025-04-09 8.8 - -
CVE-2025-22141 2025-01-08 2025-04-09 8.8 - -
CVE-2025-22143 2025-01-08 2025-02-13 6.1 - -
CVE-2025-22596 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22597 2025-01-10 2025-10-02 8.3 - -
CVE-2025-22598 2025-01-10 2025-10-02 8.3 - -
CVE-2025-22599 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22600 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22613 2025-01-13 2025-04-09 5.4 - -
CVE-2025-22614 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22615 2025-01-13 2025-02-13 6.1 - -
CVE-2025-22616 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22617 2025-01-13 2025-02-13 6.1 - -
CVE-2025-22618 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22619 2025-01-13 2025-02-13 6.1 - -
CVE-2025-23030 2025-01-14 2025-02-13 6.1 - -
CVE-2025-23031 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23032 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23033 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23034 2025-01-14 2025-02-13 6.1 - -
CVE-2025-23035 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23036 2025-01-14 2025-04-09 5.4 - -
CVE-2025-23037 2025-01-14 2025-04-09 5.4 - -
CVE-2025-23038 2025-01-14 2025-02-13 5.4 - -
CVE-2024-57030 2025-01-17 2025-04-09 8.1 - -
CVE-2024-57031 2025-01-17 2025-03-24 9.8 - -
CVE-2024-57032 2025-01-17 2025-03-19 9.8 - -
CVE-2024-57034 2025-01-17 2025-03-14 9.8 - -
CVE-2024-57033 2025-01-17 2025-04-09 6.1 - -
CVE-2024-57035 2025-01-17 2025-03-18 9.8 - -
CVE-2025-23218 2025-01-20 2025-02-28 9.8 - -
CVE-2025-23219 2025-01-20 2025-02-28 9.8 - -
CVE-2025-23220 2025-01-20 2025-02-28 9.8 - -
CVE-2025-24020 2025-01-21 2025-02-13 6.1 - -
CVE-2025-24901 2025-02-03 2025-02-13 8.8 - -
CVE-2025-24902 2025-02-03 2025-08-22 8.8 - -
CVE-2025-24905 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24906 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24957 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24958 2025-02-03 2025-02-13 8.8 - -
CVE-2025-26605 2025-02-18 2025-04-10 8.8 - -
CVE-2025-26606 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26607 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26608 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26609 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26610 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26611 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26612 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26613 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26614 2025-02-18 2025-02-28 8.8 - -
CVE-2025-26615 2025-02-18 2025-02-28 10.0 - -
CVE-2025-26616 2025-02-18 2025-02-28 7.5 - -
CVE-2025-26617 2025-02-18 2025-02-28 9.8 - -
CVE-2025-27096 2025-02-20 2025-02-28 9.8 - -
CVE-2025-27133 2025-02-24 2025-02-28 8.8 - -
CVE-2025-27140 2025-02-24 2025-02-28 9.8 - -
CVE-2025-27417 2025-03-03 2025-04-11 6.1 - -
CVE-2025-27418 2025-03-03 2025-04-10 5.4 - -
CVE-2025-27419 2025-03-03 2025-03-07 7.5 - -
CVE-2025-27420 2025-03-03 2025-04-10 5.4 - -
CVE-2025-27499 2025-03-03 2025-03-06 6.1 - -
CVE-2025-29782 2025-03-14 2025-03-25 5.4 - -
CVE-2025-30361 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30362 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30363 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30364 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30365 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30366 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30367 2025-03-27 2025-04-10 9.8 - -
CVE-2025-46828 2025-05-07 2025-07-02 9.8 - -
CVE-2025-50201 2025-06-19 2025-07-02 9.8 - -
CVE-2025-52474 2025-06-19 2025-07-02 9.8 - -
CVE-2025-6694 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6695 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6696 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6697 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6698 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6699 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-53091 2025-06-27 2025-07-08 9.8 - -
CVE-2025-53377 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53525 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53526 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53527 2025-07-07 2025-07-10 9.8 - -
CVE-2025-53529 2025-07-07 2025-07-10 9.8 - -
CVE-2025-53530 2025-07-07 2025-07-10 7.5 - -
CVE-2025-53531 2025-07-07 2025-07-10 7.5 - -
CVE-2025-53820 2025-07-14 2025-07-15 6.5 - -
CVE-2025-53821 2025-07-14 2025-07-18 4.7 - -
CVE-2025-53822 2025-07-14 2025-07-15 6.5 - -
CVE-2025-53823 2025-07-14 2025-07-15 8.8 - -
CVE-2025-53824 2025-07-14 2025-07-15 5.4 - -
CVE-2025-53929 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53930 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53931 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53932 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53933 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53934 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53935 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53936 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53937 2025-07-16 2025-07-25 9.8 - -
CVE-2025-53938 2025-07-16 2025-07-25 7.5 - -
CVE-2025-53946 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54058 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54060 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54061 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54062 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54076 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54077 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54078 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54079 2025-07-18 2025-07-30 8.8 - -
CVE-2025-55167 2025-08-12 2025-08-18 9.8 - -
CVE-2025-55168 2025-08-12 2025-08-14 9.8 - -
CVE-2025-55169 2025-08-12 2025-08-14 6.5 - -
CVE-2025-55170 2025-08-12 2025-08-14 6.5 - -
CVE-2025-55171 2025-08-12 2025-08-14 7.5 - -
CVE-2025-57761 2025-08-21 2025-08-22 8.8 - -
CVE-2025-57762 2025-08-21 2025-08-22 6.1 - -
CVE-2025-57763 2025-08-21 2025-08-22 6.1 - -
CVE-2025-57764 2025-08-21 2025-08-22 6.5 - -
CVE-2025-57765 2025-08-21 2025-08-22 6.5 - -
CVE-2025-58159 2025-08-29 2025-09-24 9.9 - -
CVE-2025-58452 2025-09-08 2025-09-17 6.1 - -
CVE-2025-58453 2025-09-08 2025-09-17 8.2 - -
CVE-2025-58454 2025-09-08 2025-09-17 8.2 - -
CVE-2025-58745 2025-09-08 2025-09-17 9.9 - -
CVE-2025-59939 2025-09-27 2025-10-06 8.8 - -
CVE-2025-61603 2025-10-02 2025-10-07 9.8 - -
CVE-2025-61604 2025-10-02 2025-10-07 7.1 - -
CVE-2025-61605 2025-10-02 2025-10-07 9.8 - -
CVE-2025-61606 2025-10-02 2025-10-07 6.1 - -
CVE-2025-61665 2025-10-02 2025-10-07 7.5 - -
CVE-2025-62177 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62178 2025-10-13 2025-10-20 3.5 - -
CVE-2025-62179 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62358 2025-10-13 2025-10-20 5.4 - -
CVE-2025-62359 2025-10-13 2025-10-20 6.1 - -
CVE-2025-62360 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62361 2025-10-13 2025-10-20 6.1 - -
CVE-2025-62597 2025-10-21 2025-10-24 6.1 - -
CVE-2025-62598 2025-10-21 2025-10-22 6.1 - -
CVE-2025-67496 2025-12-09 2025-12-18 4.3 - -
CVE-2025-67501 2025-12-10 2025-12-18 8.8 - -
CVE-2026-23722 2026-01-16 2026-01-30 9.1 - -
CVE-2026-23723 2026-01-16 2026-01-30 7.2 - -
CVE-2026-23724 2026-01-16 2026-01-30 4.3 - -
CVE-2026-23725 2026-01-16 2026-01-30 5.4 - -
CVE-2026-23726 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23727 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23728 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23729 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23730 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23731 2026-01-16 2026-01-30 4.3 - -
CVE-2026-28408 2026-02-27 2026-03-03 9.8 - -
CVE-2026-28409 2026-02-27 2026-03-03 10.0 - -
CVE-2026-28411 2026-02-27 2026-03-03 9.8 - -
CVE-2026-31894 2026-03-11 2026-03-13 7.5 - -
CVE-2026-31895 2026-03-11 2026-03-13 8.8 - -
CVE-2026-31896 2026-03-11 2026-03-13 9.8 - -
CVE-2026-33133 2026-03-20 2026-03-20 7.2 - -
CVE-2026-33134 2026-03-20 2026-03-20 9.3 - -
CVE-2026-33135 2026-03-20 2026-03-20 9.3 - -
CVE-2026-33136 2026-03-20 2026-03-20 9.3 - -
CVE-2026-33991 2026-03-27 2026-03-31 8.8 - -
CVE-2026-35395 2026-04-06 2026-04-09 8.8 - -
CVE-2026-35396 2026-04-06 2026-04-09 6.1 - -
CVE-2026-35398 2026-04-06 2026-04-09 6.1 - -
CVE-2026-35399 2026-04-06 2026-04-09 6.1 - -
CVE-2026-35472 2026-04-06 2026-04-09 6.1 - -
CVE-2026-35473 2026-04-06 2026-04-10 6.1 - -
CVE-2026-35474 2026-04-06 2026-04-10 6.1 - -
CVE-2026-35475 2026-04-06 2026-04-10 6.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for wegia by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with wegia's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.