View vulnerability details

You can view various details of each vulnerability in the overlay panel, such as Total affected assets, number of Assets at risk, number of Assets secured against the vulnerability as well as a description of the vulnerability, and useful links to further information about the vulnerability.

The Vulnerability overlay displays details for each vulnerability, including:

  • Total affected assets
  • Number of assets at risk
  • Number of assets secured against the vulnerability
  • A description of the vulnerability
  • Links to additional information

View a vulnerability's details

  1. Navigate to Vulnerability Management view
  2. (Optional) Select a custom view or apply a custom filter.
  3. In either the All detections tab or By Vulnerability tab, select the vulnerability row.
  4. The Vulnerability details overlay opens from the right.

Vulnerability details overlay features

The vulnerability name is presented in the top left corner of the overlay, with indicator pills showing the vulnerability severity, known exploit, and known ransomware inclusions.

Information is split across two tabs:

Overview tab

The Overview tab has five sections of information for you.

Overview

The overview shows you the number of:

  • Total affected assets
  • Assets at risk
  • Assets secured

If there is a known exploit, the Known exploit duration advises how long the exploit has existed.

Summary

Provides:

  • A description of the vulnerability
  • A link to the source of the vulnerability information (you may need an account to access the source, such as Bugzilla)

Details

  • Vulnerability name: The CVE code for the vulnerability.
  • Severity: Critical, Important, Moderate, or Low.
  • Risk score: The calculated score based on CVE visibility, compromise risk, and lifecycle
  • CVSS: The Common Vulnerability Scoring System numerical score.
  • CVSS version: The CVSS version used to determine the score.
  • NVD date published: The date the vulnerability CVE was first published by the National Vulnerability Database (NVD).
  • NVD date updated: The date of the last update to the CVE details published by the NVD.

Threat Insights

Shows:

  • Update available: Indicates whether a fix is available (Yes or No).
  • Has exploit: Indicates if the vulnerability has a known exploit (Yes or No).
  • Has CISA KEV exploit: Indicates if the vulnerability exploit is listed in the CISA (Cybersecurity and Infrastructure Security Agency) KEV (Known Exploited Vulnerabilities) Catalog (Yes or No).
  • Has Ransomware: Indicates if the vulnerability is known to be used in ransomware campaigns (Yes or No).

Weakness Enumeration

You can learn more about the vulnerability and the weaknesses it exposes by viewing the links presented for each of the vulnerability's CWE-ID's detected.

Affected Assets tab

The Affected assets tab allows you to view and manage devices impacted by the vulnerability.

All affected devices are presented in a table can be filtered, searched and exported to CSV.

You can select the Asset name link to go directly to that Asset's details in the Assets view.

The Affected software column displays the software affected by the vulnerability. If multiple software items are affected, select the link to view the full list.

Through the Actions column menu, you can perform all actions available for the item type and your user permission settings.

Related articles