Operation Scheduler
by Siemens
Immediate action recommended
Operation Scheduler has critical exploitation rates across its known vulnerabilities.
What to do
- Check for patches and apply immediately
- Review whether this software can be replaced with a safer alternative
- Consult your IT provider about mitigation options
What Attackers Target
Vulnerabilities with high exploit probability
75.0%
Confirmed actively exploited (CISA)
75.0%
Public exploit code available
0.0%
Based on 4 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2022-22965 | 9.8 | 94.4% | Yes |
| CVE-2021-44228 | 10.0 | 94.4% | Yes |
| CVE-2021-45046 | 9.0 | 94.3% | Yes |
| CVE-2021-31891 | 10.0 | 4.6% | — |
95
/ 100
critical-risk
Active Threat
50/50 · Critical
Exploit Availability
45/50 · Critical
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.