Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

NEC Corporation — Vulnerabilities & Security Advisories 85

Browse all 85 CVE security advisories affecting NEC Corporation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

NEC Corporation operates as a global information technology and electronics manufacturer, primarily focusing on telecommunications, social infrastructure, and enterprise solutions. With 85 recorded Common Vulnerabilities and Exposures (CVEs), the company’s historical attack surface reflects typical enterprise software risks. Common vulnerability classes include remote code execution (RCE) and cross-site scripting (XSS), often stemming from legacy web applications and embedded systems used in critical infrastructure. Privilege escalation flaws have also been documented, particularly within administrative interfaces for network management tools. While no single catastrophic breach has defined NEC’s public security history, the volume of CVEs suggests ongoing challenges in patching legacy components across its diverse product portfolio. The company generally adheres to standard industry response protocols, issuing updates for critical flaws without widespread public exploitation incidents. This profile highlights the persistent need for rigorous code review and lifecycle management in large-scale IT infrastructure providers.

CVE IDTitleCVSSSeverityPublished
CVE-2023-25011 NEC PC Settings Tool 安全漏洞 — PC settings tool 7.8 -2023-02-15
CVE-2022-34825 NEC Expresscluster X 代码问题漏洞 — CLUSTERPRO X 8.8 -2022-11-08
CVE-2022-34824 NEC Expresscluster X 安全漏洞 — CLUSTERPRO X 9.8 -2022-11-08
CVE-2022-34823 NEC Expresscluster X 安全漏洞 — CLUSTERPRO X 9.8 -2022-11-08
CVE-2022-34822 NEC Expresscluster X 路径遍历漏洞 — CLUSTERPRO X 9.8 -2022-11-08
CVE-2021-20705 NEC Corporation CLUSTERPRO 输入验证错误漏洞 — CLUSTERPRO X 7.5 -2021-11-02
CVE-2021-20707 NEC Corporation CLUSTERPRO 输入验证错误漏洞 — CLUSTERPRO X 7.5 -2021-11-02
CVE-2021-20703 NEC Corporation CLUSTERPRO缓冲区错误漏洞 — CLUSTERPRO X 9.8 -2021-11-02
CVE-2021-20701 NEC Corporation CLUSTERPRO缓冲区错误漏洞 — CLUSTERPRO X 9.8 -2021-11-02
CVE-2021-20706 NEC Corporation CLUSTERPRO 输入验证错误漏洞 — CLUSTERPRO X 7.5 -2021-11-02
CVE-2021-20704 NEC Corporation CLUSTERPRO 和 EXPRESSCLUSTER 缓冲区错误漏洞 — CLUSTERPRO X 9.8 -2021-11-02
CVE-2021-20702 NEC Corporation CLUSTERPRO 缓冲区错误漏洞 — CLUSTERPRO X 9.8 -2021-11-02
CVE-2021-20700 Office Server Document Converter 缓冲区错误漏洞 — CLUSTERPRO X 9.8 -2021-11-02
CVE-2021-20711 NEC Aterm WG2600HS 操作系统命令注入漏洞 — Aterm WG2600HS 9.8 -2021-04-26
CVE-2021-20712 NEC Aterm WF1200C 安全漏洞 — NEC Aterm devices 7.5 -2021-04-26
CVE-2021-20710 NEC Aterm WG2600HS 跨站脚本漏洞 — Aterm WG2600HS 6.1 -2021-04-26
CVE-2021-20708 NEC Aterm WF1200C 操作系统命令注入漏洞 — NEC Aterm devices 7.2 -2021-04-26
CVE-2021-20709 NEC Aterm WF1200C 安全漏洞 — NEC Aterm devices 7.2 -2021-04-26
CVE-2021-20680 NEC Aterm 跨站脚本漏洞 — NEC Aterm devices 6.1 -2021-04-26
CVE-2021-20622 多款 NEC Aterm产品跨站脚本漏洞 — Aterm WG2600HP and Aterm WG2600HP2 6.1 -2021-01-28
CVE-2021-20621 多款NEC Aterm产品跨站请求伪造漏洞 — Aterm WG2600HP and Aterm WG2600HP2 8.8 -2021-01-28
CVE-2021-20620 多款NEC Aterm产品跨站脚本漏洞 — Aterm WF800HP 6.1 -2021-01-28
CVE-2020-5686 NEC 多款产品授权问题漏洞 — UNIVERGE SV9500/SV8500 series 7.5 -2021-01-13
CVE-2020-5685 NEC 多款产品操作系统命令注入漏洞 — UNIVERGE SV9500/SV8500 series 9.8 -2021-01-13
CVE-2020-5633 NEC 多款产品授权问题漏洞 — Multiple NEC products where Baseboard Management Controller (BMC) firmware Rev1.09 and earlier is applied 9.8 -2021-01-13
CVE-2020-5684 NEC ISM Client 信任管理问题漏洞 — Management software for NEC Storage disk array system 4.8 -2020-12-24
CVE-2020-5637 Nec Platforms Aterm SAG firmware 安全漏洞 — Aterm SA3500G 6.7 -2020-12-14
CVE-2020-5636 Nec Platforms Aterm SAG firmware 安全漏洞 — Aterm SA3500G 6.8 -2020-12-14
CVE-2020-5635 Nec Platforms Aterm SAG firmware 安全漏洞 — Aterm SA3500G 8.8 -2020-12-14
CVE-2020-5632 NEC InfoCage SiteShell 安全漏洞 — InfoCage SiteShell series 7.8 -2020-10-06

This page lists every published CVE security advisory associated with NEC Corporation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.