/
Network Scan Findings

Network Scan Findings

You can find this module at the Global and Company levels.

A network vulnerability refers to a weakness or flaw in a computer network that could potentially be exploited by malicious actors or software.

NOTE: Network Scan Findings data is sourced from a probe agent during a full or network scan. No network scan findings data will be displayed if no probe agent is present. This will also result in blank data for any 'network scan findings' report, and will also have blank data


Visit our YouTube Channel for more video content: https://www.youtube.com/@connectsecure


Table of Contents


Network Scan Findings - Details

Access the Network Scan Findings from the Vulnerabilities category.

image-20250211-181702.png

Here is a sample list of network-based vulnerabilities.

Vulnerability

CVE-ID

Brief Description

Vulnerability

CVE-ID

Brief Description

EternalBlue

CVE-2017-0144

It exploits the Windows Server Message Block (SMB) protocol, which is notable for its role in WannaCry ransomware.

Apache Struts

CVE-2017-5638

Affects Apache Struts, leading to remote code execution, exploited in the Equifax data breach.

Heartbleed

CVE-2014-0160

It affects OpenSSL and allows unauthorized memory access, potentially exposing sensitive data.

BlueKeep

CVE-2019-0708

Critical RCE vulnerability in Microsoft's Remote Desktop Protocol (RDP).

Pulse Secure

CVE-2019-11510

Vulnerability in Pulse Secure VPNs allowing unauthorized access to sensitive information.

Internet Explorer

CVE-2018-8174

Exploits a scripting engine vulnerability in Internet Explorer, leading to remote code execution.

Cisco ASA

CVE-2018-0101

It affects Cisco Adaptive Security Appliance (ASA) software and allows remote code execution.

Windows CryptoAPI

CVE-2020-0601

It affects Windows CryptoAPI, which could allow an attacker to spoof code-signing certificates.

Netlogon Elevation of Privilege

CVE-2020-1472

Netlogon Remote Protocol (MS-NRPC) vulnerability allows attackers to gain elevated privileges.

Microsoft Office/Word

CVE-2017-0199

Exploits a vulnerability in Microsoft Word, allowing remote code execution.

Tap between the Assets and/or Companies to see the underlying data.

image-20250211-181916.png

By default, the table shows the Active network scan findings. Use the drop-down to change to see any of the Suppressed records with details.

image-20250211-182027.png

Switch from Global to Company to see the Open and Closed Ticket fields.

image-20250211-182138.png

Network Scan Findings - Toolbar Options

image-20250211-182447.png

Alerts

View our timeline style of System Events captured for each company. You can set an optional date filter range to target a specific date range of events.

image-20250206-143947.png

Info

Tap here to view your V4 Getting Started Info.

https://cybercns.atlassian.net/wiki/x/MIDKfw


Help Link

image-20250206-144503.png

Click to access the related documentation page; this link is functional on all screens and will take you to the appropriate documentation page.


Layout Settings

Here, you can change the UI look and feel using various options, including the Theme for color, the Scheme for dark and light mode, the Layout for toolbar and module positions, and the toggle to set the table view default.

I prefer the Teal color, Light mode, and Classic layout with an asset table view.

image-20250206-150338.png

Get Support

Our support team is here to help. Use one of three options to start a support request.

  1. Email to support@connectsecure.com

  2. Login to our Freshdesk partner portal at https://cybercns.freshdesk.com


Related content