Solutions and Applications
...
Using Vulnerability Response M...
Vulnerability Findings
5 min
the vulnerability findings application provides comprehensive details on identified vulnerabilities, their attributes, and their criticality this information ensures a robust understanding of risks, enabling prioritization and efficient remediation efforts core attributes of vulnerability findings tracking id each vulnerability finding is assigned a unique tracking id for identification and referencing within the system vulnerability id vulnerability ids correspond to standard identifiers, such as cve (common vulnerabilities and exposures), ensuring consistency and cross referencing sources sources refer to the origins or tools from which vulnerability data is collected and ingested into the vrm system status the status of findings tracks their lifecycle new finding has been enriched and requires triage pending finding has been added to a group and will shortly be added to a case open finding is associated with a case that still requires the execution of remediation items or further analysis assigned finding is associated with a case and remediation items have been submitted to remediation owners via the defined remediation channels closed finding resolved and no longer posing a risk exception finding marked as acceptable risks under specific circumstances remediation outcome you can set the outcome of the finding using drop down you can set the following and save false positive remediated exempted asset reference provides a direct link to the associated asset (for example, acme corp\192 workstation(vast 92)) to offer context for asset specific risks and information remediation advice remediation advice as provided by the original vulnerability detection tool an edit box enables entry of remediation steps or guidance to assist in resolving vulnerabilities as desired this field serves as a central repository for action plans and remediation strategies and will be provided to remediation owners reassign asset feature the reassign asset toggle indicates whether the asset associated with a vulnerability finding can be modified or whether the current assignment is locked switching this toggle makes the vulnerability asset reference field editable turbine risk score the turbine risk score evaluates the criticality of a finding based on multiple factors, enabling precise point in time prioritization you can click on the any of the vulnerability finding for more details turbine risk score visualization the turbine risk score is displayed through color coded graphs, enabling quick identification of critical vulnerabilities and understanding of the components that make up the turbine risk score key components of the default turbine risk score calculation cvss base score a metric that represents the intrinsic severity of the vulnerability based on standard cvss scoring epss score the exploit prediction scoring system estimates the likelihood of a vulnerability being exploited in the wild public exploit found indicates if a public exploit exists for the vulnerability commercial exploit found identifies whether a commercial exploit (for example, exploit kits sold by attackers) is available weaponized exploit found highlights if the vulnerability has been weaponized for widespread attacks cvss temporal or threat score incorporates temporal factors such as availability of exploit code and remediation maturity in known exploited vulnerabilities shows if the vulnerability has been listed in databases of actively exploited issues reported exploited denotes whether exploitation of the vulnerability has been observed reported exploited by threat actors indicates exploitation linked to specific threat actors or groups reported exploited by ransomware highlights if the vulnerability has been exploited in ransomware campaigns reported exploited by botnets shows exploitation as part of botnet activities trending on github tracks active discussions or exploit code trending on github asset criticality evaluates the importance of the affected system within the organization’s infrastructure asset zone criticality measures the criticality of the physical or logical zone where the asset resides swimlane intelligence this section provides a detailed repository of references and intelligence to support analysis and decision making vulnerability references includes advisories and related information such as vendor advisories exploits offers insights into active exploits associated with the vulnerability related attack patterns highlights connections to known attack vectors mitre att\&ck techniques maps vulnerabilities to specific techniques within the mitre att\&ck framework common weakness enumerations (cwes) categorizes underlying weaknesses linked to the vulnerability vulnerable cpes lists affected configurations or product versions for more details about vulnerability case management and metrics, see vulnerability case management docid\ xu7asa7xgljyn xte5vk and vulnerability findings metrics tab docid\ up7rsfoedusa7gwiohkuj