Vulnerability Management

Vulnerability Management

The Vulnerabilities section is a central hub for understanding and managing security risks associated with known software or hardware flaws. This feature provides a detailed view of vulnerabilities detected in your environment, helping prioritize remediation efforts and track affected devices.

Histogram

At the top of the page, you’ll find a Histogram that provides a visual summary of the vulnerabilities across devices, categorized by severity levels:

  • Critical (Red)
  • High (Orange)
  • Medium (Yellow)
  • Low (Green)

This graphical representation allows you to:

  • Identify trends in vulnerability distribution across the network.
  • Quickly understand the scope and urgency of remediation based on severity levels.
  • Focus on the most critical risks affecting your environment.

Vulnerabilities

Below the histogram is a prioritized list of CVE entries (Common Vulnerabilities and Exposures). This list enables you to focus on the vulnerabilities that have the most significant impact or apply to the most devices in your environment.

Each CVE entry includes:

  • CVE ID: The unique identifier for the vulnerability.
  • Severity Rating: Based on established standards such as CVSS scores.
  • Summary: A brief description of the vulnerability, including its potential impact.

Details for Each CVE

Clicking on a CVE opens a detailed view with the following information:

  1. External References

    • NVD (National Vulnerability Database): Direct links to the official NVD entry for comprehensive details about the vulnerability.
    • INCIBE (Instituto Nacional de Ciberseguridad): Links to the Spanish cybersecurity agency for localized guidance and insights.
  2. Affected Devices

    • A list of devices in your environment impacted by the specific CVE.
    • For each device, you can view its metadata, such as name, IP address, and firmware version, to understand the scope of the vulnerability.