Controller
by Aviatrix
Standard maintenance is sufficient
Controller has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
13.3%
Confirmed actively exploited (CISA)
13.3%
Public exploit code available
0.0%
Based on 15 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2024-50603 | 10.0 | 94.4% | Yes |
| CVE-2021-40870 | 9.8 | 94.3% | Yes |
| CVE-2020-13417 | 9.8 | 1.2% | — |
| CVE-2020-26553 | 9.8 | 0.8% | — |
| CVE-2020-26549 | 7.5 | 0.6% | — |
| CVE-2020-13414 | 7.5 | 0.6% | — |
| CVE-2020-26548 | 8.8 | 0.4% | — |
| CVE-2020-13413 | 5.3 | 0.4% | — |
| CVE-2020-27568 | 7.5 | 0.3% | — |
| CVE-2020-26552 | 7.5 | 0.3% | — |
| CVE-2020-26550 | 7.5 | 0.2% | — |
| CVE-2020-13416 | 6.5 | 0.2% | — |
| CVE-2020-26551 | 7.5 | 0.2% | — |
| CVE-2020-13415 | 7.5 | 0.1% | — |
| CVE-2020-13412 | 8.8 | 0.1% | — |
13
/ 100
low-risk
Active Threat
7/50 · Minimal
Exploit Availability
6/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.