Select > Reports > Portal > Repository > Standard Content > Cloud > System Vulnerabilities.
Most computer systems have programs, services, and operating systems that are vulnerable to exploitation. According to the CSA, vulnerabilities within the components of the operating system – kernel, system libraries and application tools – put the security of all services and data at significant risk.
To mitigate the risk to your systems, use the following reports and dashboard:
Lists all events associated with vulnerabilities known to affect AWS and Azure.
Lists all events that have a High or Very High severity, based on CVE and CVSS data.
Lists all events associated with the heartbleed bug, which is a system vulnerability in the OpenSSL cryptographic software library. This weakness allows malicious users to steal the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. A Heartbleed attack works by tricking servers into leaking information stored in their memory. Attackers can also get access to a server's private encryption key, allowing the attacker to unscramble any private messages sent to the server and even impersonate the server.
Lists all events associated with kernel vulnerabilities. For example, the vulnerability in the Linux Kernel netfilter/xt_TCPMSS, which could allow remote hackers to carry out a denial of service attack.
Lists all events associated with buffer overflows. When a buffer receives more data than it can handle, the data can overflow to other storage locations. Overflows can cause system crashes or create an exploitable vulnerability.
Reports the hosts that do not have the security patches needed to resolve known vulnerabilities.
Reports the hosts vulnerable to a ShellShock attack. In a ShellShock attack, the Unix shell Bash could execute arbitrary commands and allow unauthorized access to services, such as web servers, that use Bash to process requests.
Reports the hosts vulnerable to Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors. Meltdown breaks the fundamental isolation between user applications and the operating system, allowing a program to access the memory and data of other programs and the operating system. Spectre attacks break the isolation between applications, allowing programs to leak information to each other. These exploitations do not leave any traces in traditional log files.
Provides a dashboard view of the vulnerabilities found in the organization.
Lists all vulnerabilities detected on the specified hosts.