Known Vulnerabilities in Telco Cloud Operations