What are security updates? - Security updates provide records of resolved security-related software issues. These updates enable users to confirm the success of patches and maintain the integrity of their systems.

Product
ASSA ABLOY CLIQ
Synergis Cloud Link
Synergis Softwire
OnGuard
Vehicle Monitoring
Clearance
Fleet Monitoring
Mission Control
Synergis
Axis Powered by Genetec
Genetec Update Service
SDS Guardian
Security Center
Interview Room
Key Systems Security Asset Manager
Cloud Link Roadrunner
Evacuation Assistant
Content type
FAQs
Language
English
Last updated
2025-07-03

What are security updates?

Security updates provide records of resolved security-related software issues. These updates enable users to confirm the success of patches and maintain the integrity of their systems.

In the context of security vulnerabilities, criticality levels prioritize fixes based on the severity of vulnerabilities, ease of exploitation, and impact to the system.

Critical
Critical vulnerabilities are severe threats that could critically compromise system security. These issues are typically exploited remotely without requiring user interaction or complex methods. The impact could lead to a complete compromise of confidentiality, integrity, or availability of the data or systems.
High
High-level vulnerabilities are serious threats that could be exploited to fully compromise system integrity, confidentiality, or availability. They might require some level of user interaction to exploit or might be less widespread.
Medium
Medium-level vulnerabilities present a conditional threat that is potentially exploitable under certain conditions, such as user interactions, complex attacks, or unusual system setups.
Low
Low-level vulnerabilities are low-risk and unlikely to be exploited. They might lead to a slight compromise of the system's security, but generally do not affect the system's overall integrity, confidentiality, or availability.

By prioritizing fixes based on these criticality levels, the most dangerous vulnerabilities are remediated first, which minimizes risk to the system and its users.