Communications Diameter Signaling Route
by Oracle
Standard maintenance is sufficient
Communications Diameter Signaling Route has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
21.4%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 14 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2017-7525 | 9.8 | 79.3% | — |
| CVE-2020-36179 | 8.1 | 60.3% | — |
| CVE-2020-35728 | 8.1 | 40.5% | — |
| CVE-2020-36188 | 8.1 | 9.4% | — |
| CVE-2020-36184 | 8.1 | 6.9% | — |
| CVE-2020-35491 | 8.1 | 5.7% | — |
| CVE-2020-36181 | 8.1 | 5.4% | — |
| CVE-2020-36182 | 8.1 | 2.7% | — |
| CVE-2020-36180 | 8.1 | 2.7% | — |
| CVE-2020-36185 | 8.1 | 2.7% | — |
| CVE-2020-36186 | 8.1 | 2.4% | — |
| CVE-2020-36187 | 8.1 | 2.1% | — |
| CVE-2020-36183 | 8.1 | 2.1% | — |
| CVE-2019-10219 | 6.1 | 1.7% | — |
15
/ 100
low-risk
Active Threat
15/50 · Low
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.