Rconfig

by Rconfig

Take action — actively targeted

Rconfig is actively targeted by attackers. A significant proportion of its known vulnerabilities are being exploited.

What to do
  1. Apply all available updates immediately
  2. Review your exposure — is this internet-facing?
  3. Monitor vendor advisories for this product

What Attackers Target

Vulnerabilities with high exploit probability 47.7%
Confirmed actively exploited (CISA) 2.3%
Public exploit code available 6.8%
Based on 44 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2019-16662 9.8 94.5%
CVE-2020-10220 9.8 94.3%
CVE-2019-16663 8.8 94.1%
CVE-2020-10549 9.8 93.0%
CVE-2020-10548 9.8 92.8%
CVE-2020-10546 9.8 92.4%
CVE-2020-13638 9.8 92.2%
CVE-2020-10547 9.8 92.1%
CVE-2019-19509 8.8 91.9%
CVE-2020-10221 8.8 91.4% Yes
CVE-2020-10879 9.8 86.2%
CVE-2023-39110 8.8 80.1%
CVE-2023-39108 8.8 78.5%
CVE-2023-39109 8.8 78.5%
CVE-2020-12259 5.4 68.3%
CVE-2020-12255 8.8 58.6%
CVE-2020-23151 9.8 55.6%
CVE-2020-12256 5.4 54.9%
CVE-2020-9425 7.5 49.4%
CVE-2022-44384 8.8 48.7%
54
/ 100
high-risk
Active Threat 50/50 · Critical
Exploit Availability 4/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.