Vulnerabilities
This section provides an overview of Vulnerabilities detected using CyberCNS.
CyberCNS scans your IT Infrastructure (Servers, Desktops/Laptops, Network Equipment) using standard protocols to determine the version of Software and Firmware running on these systems. Based on that version information, CyberCNS detects how vulnerable the system is.
Several times a day, the CyberCNS vulnerability databases are synchronized with several cloud resources and your IT infrastructure is checked for potential vulnerabilities and exploits. A Vulnerability overview for each company by OS and by Severity is shown below.
One can get more information about each Vulnerability by clicking on the numbers, which in turn opens a detailed overview.
Company Level
If the Application is Active or Suppressed on a Remediation plan, those vulnerabilities related to that Application will be shown under either Active or Suppressed status respectively.
As in the image depicted below, click on the Severity ( Critical, High, Medium, or Low) count, and it will take you to the vulnerability by OS page for that severity.
By default Active Vulnerabilities are shown.
The suppressed vulnerabilities will be shown under Suppressed category.
Select any of the products and click the vulnerability count to know more details. On the selection basis, Vulnerabilities are shown.
Using the search bar, it is possible to choose the particular Vulnerability that can be searched by giving Common Vulnerabilities and Exposures(CVE) Id.
Click on the CVEID to get the information specific about that asset.
Click on the link to view the Affected Asset(s).
In the image depicted below, click on Affected Assets to get the information of affected assets.
Click on the link to view the Affected Asset(s).
When you click on the link, the page will be redirected to the asset page to get a detailed description of the Affected Asset.
Global Level
If the Application is Active or Suppressed on a Remediation plan, those vulnerabilities related to that Application will be shown under either Active or Suppressed status respectively.
As in the image depicted below, click on any of the Severity ( Critical, High, Medium, or Low) counts, and it will take you to the vulnerability by OS page for that severity. By default Active Vulnerabilities are shown.
Â
The suppressed vulnerabilities will be shown under Suppressed category.
Select any of the products and click the vulnerability count to know more details. On the selection basis, Vulnerabilities are shown.
Using the search bar, it is possible to choose the particular Vulnerability that can be searched by giving Common Vulnerabilities and Exposures(CVE) Id.
Click on the CVEID and Affected Assets to get the information on that asset.
Click on the link to view the Affected Asset(s).
Click on the link to view the Affected Asset(s).
Â
When you click on the link, the page will be redirected to the asset page to get a detailed description of the Affected Asset.
This completes the Vulnerabilities.
Â