unisys CVE Vulnerabilities & Metrics

Focus on unisys vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About unisys Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with unisys. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total unisys CVEs: 20
Earliest CVE date: 31 Dec 2002, 05:00 UTC
Latest CVE date: 13 Sep 2022, 20:15 UTC

Latest CVE reference: CVE-2022-32555

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical unisys CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.23

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 14
7.0-8.9 4
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS unisys CVEs

These are the five CVEs with the highest CVSS scores for unisys, sorted by severity first and recency.

All CVEs for unisys

CVE-2022-32555 unisys vulnerability CVSS: 0 13 Sep 2022, 20:15 UTC

Unisys Data Exchange Management Studio before 6.0.IC2 and 7.x before 7.0.IC1 doesn't have an Anti-CSRF token to authenticate the POST request. Thus, a cross-site request forgery attack could occur.

CVE-2021-43394 unisys vulnerability CVSS: 7.5 24 Jan 2022, 22:15 UTC

Unisys OS 2200 Messaging Integration Services (NTSI) 7R3B IC3 and IC4, 7R3C, and 7R3D has an Incorrect Implementation of an Authentication Algorithm. An LDAP password is not properly validated.

CVE-2021-45445 unisys vulnerability CVSS: 5.0 12 Jan 2022, 18:15 UTC

Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.

CVE-2021-35056 unisys vulnerability CVSS: 4.6 15 Jul 2021, 19:15 UTC

Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. An unintended executable might run.

CVE-2021-28492 unisys vulnerability CVSS: 4.0 20 Apr 2021, 16:15 UTC

Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format.

CVE-2021-3141 unisys vulnerability CVSS: 2.1 18 Mar 2021, 05:15 UTC

In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.

CVE-2020-24620 unisys vulnerability CVSS: 2.1 01 Oct 2020, 17:15 UTC

Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can potentially reveal credentials.

CVE-2020-12053 unisys vulnerability CVSS: 7.5 22 Jun 2020, 20:15 UTC

In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint could be authorized without a private key.

CVE-2020-12647 unisys vulnerability CVSS: 7.2 21 May 2020, 03:15 UTC

Unisys ALGOL Compiler 58.1 before 58.1a.15, 59.1 before 59.1a.9, and 60.0 before 60.0a.5 can emit invalid code sequences under rare circumstances related to syntax. The resulting code could, for example, trigger a system fault or adversely affect confidentiality, integrity, and availability.

CVE-2019-18193 unisys vulnerability CVSS: 6.9 03 Feb 2020, 14:15 UTC

In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material inadvertently logged under certain conditions. Fixed included in 3.4.109, 4.0.027.13, 4.0.125 and 5.0.013.0.

CVE-2019-18386 unisys vulnerability CVSS: 5.8 07 Jan 2020, 19:15 UTC

Systems management on Unisys ClearPath Forward Libra and ClearPath MCP Software Series can fault and have other unspecified impact when receiving specifically crafted message payloads over a systems management communication channel

CVE-2018-8049 unisys vulnerability CVSS: 5.0 03 Apr 2018, 22:29 UTC

The Stealth endpoint in Unisys Stealth SVG 2.8.x, 3.0.x before 3.0.1999, 3.1.x, 3.2.x before 3.2.030, and 3.3.x before 3.3.016, when running on Linux and AIX, allows remote attackers to cause a denial of service (crash) via crafted packets.

CVE-2018-8802 unisys vulnerability CVSS: 6.5 26 Mar 2018, 21:29 UTC

SQL injection vulnerability in the management interface in ePortal Manager allows remote attackers to execute arbitrary SQL commands via unspecified parameters.

CVE-2018-5762 unisys vulnerability CVSS: 4.3 26 Feb 2018, 15:29 UTC

The TLS implementation in the TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 58.1 before 58.160, 59.1 before 059.1a.17 (IC #17), and 60.0 before 60.044 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.

CVE-2018-6592 unisys vulnerability CVSS: 4.6 19 Feb 2018, 19:29 UTC

Unisys Stealth 3.3 Windows endpoints before 3.3.016.1 allow local users to gain access to Stealth-enabled devices by leveraging improper cleanup of memory used for negotiation key storage.

CVE-2017-13684 unisys vulnerability CVSS: 4.6 30 Sep 2017, 01:29 UTC

Unisys Libra 64xx and 84xx and FS601 class systems with MCP-FIRMWARE before 43.211 allow remote authenticated users to cause a denial of service (program crash) or have unspecified other impact via vectors related to incorrect literal handling, which trigger CPM stack corruption.

CVE-2016-7805 unisys vulnerability CVSS: 4.3 09 Jun 2017, 16:29 UTC

The mobiGate App for Android version 2.2.1.2 and earlier and mobiGate App for iOS version 2.2.4.1 and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2017-5873 unisys vulnerability CVSS: 4.6 11 Apr 2017, 15:59 UTC

Unquoted Windows search path vulnerability in the guest service in Unisys s-Par before 4.4.20 allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe.

CVE-2017-5872 unisys vulnerability CVSS: 5.0 10 Mar 2017, 02:59 UTC

The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.

CVE-2015-4049 unisys vulnerability CVSS: 5.6 03 Feb 2017, 19:59 UTC

Unisys Libra 43xx, 63xx, and 83xx, and FS600 class systems with MCP-FIRMWARE 40.0 before 40.0IC4 Build 270 might allow remote authenticated users to cause a denial of service (data corruption or system crash) via vectors related to using program operators during EPSILON (level 5) based codefiles at peak memory usage, which triggers CPM stack corruption.

CVE-2009-1628 unisys vulnerability CVSS: 10.0 26 Jun 2009, 18:30 UTC

Stack-based buffer overflow in mnet.exe in Unisys Business Information Server (BIS) 10 and 10.1 on Windows allows remote attackers to execute arbitrary code via a crafted TCP packet.

CVE-2002-2179 unisys vulnerability CVSS: 7.8 31 Dec 2002, 05:00 UTC

The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap.