Skip to main content

Vulnerabilities

The Vulnerabilities page displays all the vulnerable applications discovered on devices in your environment during scanning. It provides detailed info of their level of severity, number of known CVEs per application, and number of affected devices.

The top 100 vulnerabilities are displayed for each application. The vulnerabilities are ranked by severity. After resolving existing vulnerabilities, you can run a Risk scan task to discover and display more.

era_vulnerabilities_937397_en.png
  1. The Smart views panel toggle button. This feature allows you to customize, save, and switch between different loadouts of the Vulnerabilities page.

    era_vulnerabilities_smart_views937397_en.png

    The panel has the following sections:

    • Search views - Use this search field to filter out the views displayed in the sections below, by name.

    • Saved - This section displays a list of all your saved views that have not been marked as favorites.

    • Favorites - All views marked as favorites are displayed under this section.

    • Defaults - This section displays the views that are available by default:

      • All Vulnerabilities

      • High severity

      • Ignored

      • Watchlist

    For any view in the Saved or Favorites category, you can click ellipses.PNG to Rename or Delete the view.

  2. The Vulnerability actions. This section contains the buttons to all the available actions you can take on the risks displayed on the page:

    • State - Change the state of the selected risks. The following options are available:

      • Ignore risks

      • Restore ignored risks

    • Watchlist - Add or removed the selected risks from your watchlist. The following options are available:

      • Add to watchlist

      • Remove from watchlist

    • Scan - Perform a scan to check for new risks or updates on known risks.

  3. The Filters section. You can use these options to customize the risks that are displayed in the below grid.

    The following filters are currently available:

    Filtering option

    Details

    Vulnerability name

    Use the searchable drop-down menu to filter the list of Vulnerabilities by name. Select the Vulnerabilities you want to display and click Apply.

    Only the selected Vulnerabilities are displayed.

    Risk score

    Select a risk score range between 1 and 100.

    Only Vulnerabilities with a risk score between these values are displayed.

    CVE code

    Use the searchable drop-down menu to filter the list of Common Vulnerabilities and Exposures (CVEs) by name. Select the CVEs you want to display and click Apply.

    Only Vulnerabilities related to the selected CVEs are displayed.

    Device name

    Use the searchable drop-down menu to filter the list of devices by name. Select the devices you want and click Apply.

    Only Vulnerabilities that apply to the selected devices are displayed.

    OS

    Use the searchable drop-down menu to filter the list of devices by operating system. Select the operating systems you want and click Apply. Possible values:

    • Unknown

    • IOS

    • Android

    • Windows

    • Linux

    • Solaris

    • Mac OS X

    • Container

    Only Vulnerabilities that affect the selected operating systems are displayed.

    Application type

    Select the type of Vulnerabilities you want to display. Possible values:

    • OS

    • Application

    Only Vulnerabilities of the type you select are displayed.

    State

    This column allows you to filter the list of indicators of risk by their status, Active or Ignored.

    Use the searchable drop-down menu to filter the list of devices by state. Select the states you want and click Apply. Possible values:

    • Active

    • Ignored

    Only Vulnerabilities with the states you selected are displayed.

    Exploits

    Use this filter to display Vulnerabilities that have existing exploits, ones that don't, or both.

    Targets your industry

    Use this filter to display Vulnerabilities that target your industry, ones that don't, or both.

    Affected Device

    Use the searchable drop-down menu to filter the list of device types by name. Select the devices you want and click Apply.

    The following values are available:

    • Endpoint

    • Server

    • Not affected

    Only vulnerabilities affecting the selected device types are displayed.

    In watchlist

    Use this filter to display vulnerabilities based on them currently being included in a watchlist. Possible values:

    • Yes

    • No

  4. The View options menu. This section provides you with multiple functions for working with views:

    • Save - Save changes you make to a saved view.

    • Save as - Save a modified view under a different name.

    • Discard changes - Revert the saved view to its original state.

    • Add to favorites - Add the view to the Favorites category.

    • Show or hide filters - Hide or display the filters menu.

    • Open settings - Display the Settings panel.

      You can use this panel to customize what columns are displayed in the view and enable or disable the Compact view.

  5. The Vulnerabilities grid. The grid displays all known Vulnerabilities in your company, based on your last scan.

    The information available for each Vulnerabilities displayed under the following columns:

    • Application name - The name of the application the Vulnerability applies to.

    • Risk score - The risk score of the Vulnerability.

    • CVEs - The number of CVEs that apply to the Vulnerability.

    • Affected Devices - The number of affected devices by this Vulnerability, displayed per type.

    • OS - The type of operating system that is affected by the Vulnerability.

    • Application type - The type of the application.

    • State - The state of the Vulnerability.

    • Exploits - Indicates if there are any existing exploits of the Vulnerability.

    • Targets your industry - Indicates if the Vulnerability typically targets your industry.

    • In watchlist - Indicates if the Vulnerabilities currently in the watchlist.

    Note

    More details regarding the information in each column are available type in the Filters section.

  6. Actions button - Displays all the actions you can take on each Vulnerability. Possible values:

    • Ignore application

    • Add to watchlist