Telco Cloud Infrastructure
by Vmware
Review your setup
Telco Cloud Infrastructure has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
10.0%
Confirmed actively exploited (CISA)
50.0%
Public exploit code available
0.0%
Based on 10 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2025-22224 | 9.3 | 47.3% | Yes |
| CVE-2025-22225 | 8.2 | 10.0% | Yes |
| CVE-2025-22226 | 7.1 | 4.3% | Yes |
| CVE-2026-22719 | 8.1 | 2.3% | Yes |
| CVE-2025-41244 | 7.8 | 0.6% | Yes |
| CVE-2025-22243 | 7.5 | 0.2% | — |
| CVE-2025-22245 | 5.9 | 0.2% | — |
| CVE-2025-22244 | 6.9 | 0.1% | — |
| CVE-2026-22720 | 8.0 | 0.1% | — |
| CVE-2026-22721 | 6.2 | 0.0% | — |
39
/ 100
moderate-risk
Active Threat
4/50 · Minimal
Exploit Availability
35/50 · High
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.