Company Network Scan Findings

https://youtu.be/REG81jnEh9s

NOTE: Network Scan Findings data is sourced from a probe agent. If no probe agent is present, no network scan findings data will be displayed. This will also result in blank data for any 'network scan findings' reports.

image-20240827-154611.png

A Network Vulnerability refers to a weakness or flaw in a computer code or network that could potentially be exploited by malicious actors or software.

Here is a sample list of network-based vulnerabilities.

Vulnerability

CVE-ID

Brief Description

Vulnerability

CVE-ID

Brief Description

EternalBlue

CVE-2017-0144

Exploits Windows Server Message Block (SMB) protocol, notable for its role in WannaCry ransomware.

Apache Struts

CVE-2017-5638

Affects Apache Struts, leading to remote code execution, exploited in the Equifax data breach.

Heartbleed

CVE-2014-0160

Affects OpenSSL, allows unauthorized access to memory, potentially exposing sensitive data.

BlueKeep

CVE-2019-0708

Critical RCE vulnerability in Microsoft's Remote Desktop Protocol (RDP).

Pulse Secure

CVE-2019-11510

Vulnerability in Pulse Secure VPNs allowing unauthorized access to sensitive information.

Internet Explorer

CVE-2018-8174

Exploits a scripting engine vulnerability in Internet Explorer, leading to remote code execution.

Cisco ASA

CVE-2018-0101

Affects Cisco Adaptive Security Appliance (ASA) software, allows remote code execution.

Windows CryptoAPI

CVE-2020-0601

Affects Windows CryptoAPI, could allow an attacker to spoof code-signing certificates.

Netlogon Elevation of Privilege

CVE-2020-1472

Vulnerability in Netlogon Remote Protocol (MS-NRPC) allowing attackers to gain elevated privileges.

Microsoft Office/Word

CVE-2017-0199

Exploits a vulnerability in Microsoft Word, allowing remote code execution.


This is your Company view of all detected network-based vulnerabilities organized by sorting columns.


Company Network Scan Findings - Table of Contents


Company Network Scan Findings - Overview

The network scanning findings data have built-in filters to differentiate between Active and Suppressed and Confirmed and Unconfirmed.

Use the column selector to add, remove, and organize the data you see:

Field

Description

Field

Description

CVE

Displays the problem name or CVEID if applicable

Severity

Displays the severity as Critical, High, Medium, or Low

CVSS Score

Displays the CVSS Base Score from NVD (if applicable)

Version

Displays the affected software version (if applicable)

Affected OS

Displays the affected operating system (if applicable)

Title

Displays the description of the problem / CVEID

Confirmed

Displays as Yes or No; Confirmed means X

Ticket ID

Displays a hyperlink to the Ticket ID from PSA integration (if applicable)

Assets

Displays the count of Assets affected by the application vulnerability


Company Network Scan Findings - Action Toolbar Overview

The standard Alerts feature is only available on the right navigation bar; this displays the standard System Events data.


Need Support?

Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login