Network Services Orchestrator
by Cisco
Standard maintenance is sufficient
Network Services Orchestrator has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
18.2%
Confirmed actively exploited (CISA)
18.2%
Public exploit code available
0.0%
Based on 11 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2021-44228 | 10.0 | 94.4% | Yes |
| CVE-2025-32433 | 10.0 | 53.6% | Yes |
| CVE-2024-20381 | 8.8 | 1.9% | — |
| CVE-2023-20040 | 5.5 | 1.5% | — |
| CVE-2018-0274 | 8.8 | 0.9% | — |
| CVE-2021-1132 | 5.3 | 0.7% | — |
| CVE-2018-0463 | 7.5 | 0.6% | — |
| CVE-2024-20369 | 4.7 | 0.2% | — |
| CVE-2024-20366 | 7.8 | 0.1% | — |
| CVE-2021-1572 | 7.8 | 0.1% | — |
| CVE-2020-3362 | 4.7 | 0.1% | — |
18
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
8/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.