Vulnerability Management (New)

The Vulnerability Management view allows you to monitor assets efficiently using filters, searches, and actions. Powered by our new Modern Agent, Vulnerability Management helps identify patterns, trends, and anomalies, uncovering opportunities, risks, and areas for improvement.

Vulnerability Management provides 2 distinct tabbed views;

  • All Detections displays all the vulnerability detections individually.
  • By Vulnerability groups the vulnerabilities displayed, making it easier to see numbers of devices effected by each vulnerability.
  • Each vulnerability also shows how many assets are at risk and also provides a list of those assets in the Assets at risk view. You can also launch directly into the All devices view for each asset from here as well.

You may notice vulnerabilities for an application that you have set Patch Management to auto-approve the patches for. In this scenario it is best to double check 2 things before raising a support case.

  1. Is the application still supported by the vendor?
  2. In the event an application is no longer supported by the vendor, there will be no more available patches for it, which means Patch Management cannot update it.

  3. Is Patch Management configured as you expect it to be?
  4. Assuming the application is still supported by the vendor, Patch Management should be patching as updates become available, assuming your configured Protection Policy is set to do so.

N-able recommends that, wherever possible, the application be uninstalled and an alternative application used in its place.

Vulnerability Management scans

Endpoints run a software inventory scan at 06:00, 12:00, 18:00, and 24:00 as per endpoint local time.

  • If there is a change from the prior completed scan, the update is uploaded to our cloud and processed
  • If nothing has changed, no upload occurs
  • At least one upload per day will occur, regardless of change

Updates to the software inventory sent to the cloud are processed as they arrive, and will queued and processed before they update the state of the vulnerability, This queue can stack up and take up to 4 hours to process from start to finish.

A given vulnerability entry will remain in the database for up to 90 days since the last change to its status.

If a software version with a vulnerability is detected and then that software is no longer detected, the vulnerability shifts from unresolved to resolved.

  • If a software version that has that same vulnerability is then later detected, the vulnerability will then move back to an unresolved status.
  • We do not currently track vulnerability change causes, only that a vulnerable software was detected at one point in time and that when we inventoried again, that vulnerable software was no longer present.

If a scan is missed on a device because it is powered off or otherwise non-operational, the device will be scanned at the next scheduled scan time.

Access the Vulnerability Management view

Actions available from the Vulnerability Management view

After you identify the vulnerability issues you are looking for, you can take action directly from the Vulnerability Management view with the following tasks:

Viewable data fields via All Detections

Column name Description
Vulnerability ID The CVE code for the vulnerability.
Asset Name The unique identifier assigned to an asset, enabling efficient tracking, management, and troubleshooting. You can update this information within the classic platform (N-central or N-sight).
CVSS (Common Vulnerability Scoring System) Score Numerical score as per CVSS for the vulnerability.
Severity Critical

Important

Moderate

Low

Threat Status Resolved or Unresolved.
Affected Products Product name affected by the vulnerability.
Customer Name of the client the asset belongs to.
Site The name of the client site where the device resides.
Date Published The date the vulnerability CVE was published.
First detected Initial detection date for the vulnerability on the device.
Last updated The most recent date of the previous vulnerability information update.
Update available Yes or No. Indicates if an update that will resolve the vulnerability is available.
Risk Score This score gives an overall view of how severe the vulnerability is by considering factors like how well-known the CVE is, the risk of it being compromised, and its life cycle.
OS Role Asset OS is either a Server or Workstation operating system.
Has exploit Yes or No. Indicates if the vulnerability has a known exploit.
CISA KEV Yes or No. Indicates if the vulnerability is listed in the CISA (Cybersecurity and Infrastructure Security Agency) KEV (Known Exploited Vulnerabilities) Catalog.
Has ransomeware Yes or No. Indicates if the vulnerability is known to be used in ransomware campaigns.
CWEs The Common Weakness Enumeration (CWE) ID. Common software and hardware weakness types that could have security ramifications.

A weakness is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities.

A CWE is assigned an ID in the form CWE-<ID>, where the <ID> is simply a unique number chosen at the time of assignment (e.g., “CWE-798”). The CWE-ID is followed by a descriptive name for the weakness (e.g., “CWE-798: Use of Hard-coded Credentials”).

See the CWE website for full details.

Viewable data fields via By Vulnerability

Column name Description
Vulnerability ID The CVE code for the vulnerability.
Severity Critical

Important

Moderate

Low

CVSS (Common Vulnerability Scoring System) Score Numerical score as per CVSS for the vulnerability.
Update available Yes or No. Indicates if an update that will resolve the vulnerability is available.
Asset at risk The unique identifier assigned to an asset, enabling efficient tracking, management, and troubleshooting. You can update this information within the classic platform (N-central or N-sight).
Customer Name of the client the asset belongs to.
Date Published The date the vulnerability CVE was published.
Last updated The most recent date of the previous vulnerability information update.
Risk Score This score gives an overall view of how severe the vulnerability is by considering factors like how well-known the CVE is, the risk of it being compromised, and its life cycle.
Has exploit Yes or No. Indicates if the vulnerability has a known exploit.
CISA KEV Yes or No. Indicates if the vulnerability is listed in the CISA (Cybersecurity and Infrastructure Security Agency) KEV (Known Exploited Vulnerabilities) Catalog.
Has ransomeware Yes or No. Indicates if the vulnerability is known to be used in ransomware campaigns.
CWEs This column displays the Common Weakness Enumeration (CWE) ID. Common software and hardware weakness types that could have security ramifications.

A “weakness” is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities. A CWE is assigned an ID in the form CWE-<ID>, where the <ID> is simply a unique number chosen at the time of assignment (e.g., “CWE-798”). The CWE-ID is followed by a descriptive name for the weakness (e.g., “CWE-798: Use of Hard-coded Credentials”).

See the CWE website for full details.

Ecoverse functions

All new Ecoverse views support filtering, sorting, searching, and exporting.

Select a link below to view full instructions and details.

Some Ecoverse views may not include all available functions at launch. As new views are developed, features like filtering, sorting, searching, and exporting may be added over time.