Advanced Cluster Security
by Redhat
Review your setup
Advanced Cluster Security has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
50.0%
Confirmed actively exploited (CISA)
16.7%
Public exploit code available
0.0%
Based on 6 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2023-44487 | 7.5 | 94.4% | Yes |
| CVE-2023-48795 | 5.9 | 56.7% | — |
| CVE-2024-0406 | 6.1 | 17.3% | — |
| CVE-2022-1902 | 8.8 | 0.8% | — |
| CVE-2025-5198 | 5.0 | 0.1% | — |
| CVE-2023-4958 | 6.1 | 0.0% | — |
43
/ 100
moderate-risk
Active Threat
38/50 · High
Exploit Availability
5/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.