Network Scan Findings
You can find this module at the Global and Company levels.
A network vulnerability refers to a weakness or flaw in a computer network that could potentially be exploited by malicious actors or software.
NOTE: Network Scan Findings data is sourced from a probe agent during a full or network scan. No network scan findings data will be displayed if no probe agent is present. This will also result in blank data for any 'network scan findings' report, and will also have blank data
Visit our YouTube Channel for more video content: https://www.youtube.com/@connectsecure
Table of Contents
Network Scan Findings - Details
Access the Network Scan Findings from the Vulnerabilities category.
Here is a sample list of network-based vulnerabilities.
Vulnerability | CVE-ID | Brief Description |
---|---|---|
EternalBlue | CVE-2017-0144 | It exploits the Windows Server Message Block (SMB) protocol, which is notable for its role in WannaCry ransomware. |
Apache Struts | CVE-2017-5638 | Affects Apache Struts, leading to remote code execution, exploited in the Equifax data breach. |
Heartbleed | CVE-2014-0160 | It affects OpenSSL and allows unauthorized memory access, potentially exposing sensitive data. |
BlueKeep | CVE-2019-0708 | Critical RCE vulnerability in Microsoft's Remote Desktop Protocol (RDP). |
Pulse Secure | CVE-2019-11510 | Vulnerability in Pulse Secure VPNs allowing unauthorized access to sensitive information. |
Internet Explorer | CVE-2018-8174 | Exploits a scripting engine vulnerability in Internet Explorer, leading to remote code execution. |
Cisco ASA | CVE-2018-0101 | It affects Cisco Adaptive Security Appliance (ASA) software and allows remote code execution. |
Windows CryptoAPI | CVE-2020-0601 | It affects Windows CryptoAPI, which could allow an attacker to spoof code-signing certificates. |
Netlogon Elevation of Privilege | CVE-2020-1472 | Netlogon Remote Protocol (MS-NRPC) vulnerability allows attackers to gain elevated privileges. |
Microsoft Office/Word | CVE-2017-0199 | Exploits a vulnerability in Microsoft Word, allowing remote code execution. |
Tap between the Assets and/or Companies to see the underlying data.
By default, the table shows the Active network scan findings. Use the drop-down to change to see any of the Suppressed records with details.
Switch from Global to Company to see the Open and Closed Ticket fields.
Network Scan Findings - Toolbar Options
Alerts
View our timeline style of System Events captured for each company. You can set an optional date filter range to target a specific date range of events.
Info
Tap here to view your V4 Getting Started Info.
https://cybercns.atlassian.net/wiki/x/MIDKfw
Help Link
Click to access the related documentation page; this link is functional on all screens and will take you to the appropriate documentation page.
Layout Settings
Here, you can change the UI look and feel using various options, including the Theme for color, the Scheme for dark and light mode, the Layout for toolbar and module positions, and the toggle to set the table view default.
I prefer the Teal color, Light mode, and Classic layout with an asset table view.
Get Support
Our support team is here to help. Use one of three options to start a support request.
Email to support@connectsecure.com
Login to our Freshdesk partner portal at https://cybercns.freshdesk.com