Vigorconnect
by Draytek
Standard maintenance is sufficient
Vigorconnect has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
28.6%
Confirmed actively exploited (CISA)
28.6%
Public exploit code available
0.0%
Based on 7 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2021-20124 | 7.5 | 94.1% | Yes |
| CVE-2021-20123 | 7.5 | 94.0% | Yes |
| CVE-2021-20125 | 9.8 | 3.2% | — |
| CVE-2021-20129 | 7.5 | 1.5% | — |
| CVE-2021-20127 | 8.1 | 0.6% | — |
| CVE-2021-20128 | 5.4 | 0.2% | — |
| CVE-2021-20126 | 8.8 | 0.1% | — |
28
/ 100
low-risk
Active Threat
16/50 · Low
Exploit Availability
12/50 · Low
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.