# Vulnerability Management

The Vulnerabilities page displays the complete details of all the vulnerabilities identified in the applications. The page displays the following panels:

* [Vulnerability Prioritization](#vulnerability-prioritization)
* [Vulnerability Enrichment](#vulnerability-optimization)

### Vulnerability Prioritization

The vulnerability prioritization panel displays the vulnerabilities in the form of graphs. Vulnerabilities are given prioritization ranks based on Exploit Prediction Scoring System (EPSS), the Common Vulnerability Scoring System (CVSS), and the Knowledge of Exploit Vulnerability (KEV).

**EPSS**

EPSS is a predictive model that analyzes the risk level of the vulnerability being exploited in the future. It evaluates the complexity of exploitation, the existence of publicly available exploits, and the potential impact of an exploit. By analyzing these elements, EPSS assigns a score that indicates the risk level associated with a vulnerability.

**CVSS**

CVSS is a framework for assessing the severity of vulnerabilities. It provides a standardized method for evaluating vulnerabilities based on various metrics, such as exploitability, impact, and complexity. The CVSS score, ranging from 0 to 10, helps you to prioritize the response efforts by identifying the most critical vulnerabilities.

**KEV**&#x20;

KEV, or Knowledge of Exploit Vulnerability, refers to the availability of information about a vulnerability and its associated exploits. A high KEV indicates that detailed information about the vulnerability is publicly available, increasing the likelihood of exploitation. By considering KEV alongside EPSS and CVSS scores, you can gain a more comprehensive understanding of the risk posed by a vulnerability.

The vulnerabilities are ranked based on prioritization, into 6 types of categories as shown below:

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FKF2NBZiCTEllIqTOFiwE%2Fvulnerabilities%20prioriti.png?alt=media&#x26;token=bace9378-0186-4b53-88c5-1667857d8eeb" alt=""><figcaption></figcaption></figure>

* **Priority 1+** - Top priority, these vulnerabilities are found in CISA's Known Exploited Vulnerabilities Database and is the real threat.&#x20;
* **Priority 1** - (Upper right quadrant) - Critical vulnerabilities which are most likely to be exploited. For a Vulnerability to be in Priority 1, CVSS score should be greater than 6 and EPSS score greater than 0.2.
* **Priority 2** - (Bottom right quadrant) - These vulnerabilities may cause serious impact and are much less likely to be exploited. For a Vulnerability to be in Priority 2, the CVSS score should be greater than 6 and EPSS Score should be less than 0.2.
* **Priority 3** - (Upper Left quadrant) - These vulnerabilities are more likely to be exploited but  would not cause serious impact. For a Vulnerability to be in Priority 3, the CVSS score should be less than 6 and EPSS Score should be greater than 0.2.
* **Priority 4** - (Bottom Left quadrant) - These vulnerabilities are less likely to be exploited and would not cause serious impact. For a Vulnerability to be in Priority 4, the CVSS score should be less than 6 and EPSS Score should be less than 0.2.
* **Unprioritized** - Vulnerabilities which are not categorized by the above 5 types of Priorities are considered as unprioritized.

{% hint style="info" %}

* You can download the vulnerability data as .json, .pdf or .csv files.&#x20;
  {% endhint %}

### Vulnerability Enrichment

The vulnerability enrichment panel displays the vulnerabilities that are of exploitation, automatable and technical impact category.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FzvKS2SwXNjAGuCqK28It%2Fvulnerabilities%20%20enrich.png?alt=media&#x26;token=ea3b22f4-b9d4-4ed1-8295-368e1de7cce7" alt=""><figcaption></figcaption></figure>

### Top 5 Vulnerabilities

The **Top 5 Vulnerabilities** tab on expanding, displays the list of 5 most critical and prioritized vulnerabilities for the selected application along with their CVSS value.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2F8DP936sQUGlvNhBsXFjo%2Fvulnerabilities%20report.png?alt=media&#x26;token=7292e7d0-6705-4015-8916-70c69a434db2" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FKPFtiJnX4PM3Zi7JOAOU%2Fimage.png?alt=media&#x26;token=26d4ac73-cb1a-4295-9138-4b5ba430a539" alt=""><figcaption></figcaption></figure>

### Vulnerability Deduplication

To avoid duplication of vulnerabilities, components impacted with the same CVE are grouped and displayed.&#x20;

In the example shown below, components that are impacted by CVE-2024-22262 are grouped under it.&#x20;

<figure><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXe-HCwrB3gZBS7S-eTaXTGEkJexoS6CSruOP0OkX6PGrPI0JJtdlI1q1fh92wWzFuiriR4qisklY9V0Z2gJbVq_Bdf6vnpWmUkxGEUf2cr22GwwZNCUZARGZOwyNiWTpfOKAsvYxV74c1RLfSAB84Ob1j9W?key=RK3SZlo7OVlIiJdDiuxpwQ" alt=""><figcaption></figcaption></figure>

On clicking the CVE, a popup is displayed. The **Show impacted components** section displays the total number of components impacted by the selected CVE.

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FjkpE6sjUTQ5iZydhuCKR%2Fvulnerabilities%20impacted%20.png?alt=media&#x26;token=712b171c-7608-4122-be7b-3ee7e37c1981" alt=""><figcaption></figcaption></figure>

By expanding this section, all the components that are impacted are displayed as shown below:

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FCwDU1UzWqsKUjUvG2F30%2Fvulnerabilities%20impacted%202.png?alt=media&#x26;token=f4e73931-cd03-40e7-88d1-b2815fd953de" alt=""><figcaption></figcaption></figure>

### JIRA Automation

JIRA tickets are automatically created and also can be manually created for the vulnerabilities. If the vulnerability with security issue is of Critical or High severity, the Jira is automatically created and for other severities you can create manually by using the **Create Jira Ticket** option in the vulnerabilities details popup.&#x20;

#### Creating JIRA Ticket

To create JIRA tickets, follow the steps given below:&#x20;

* Expand the **Show impacted components** drop down. The list of all the components impacted by the selected vulnerability are displayed.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2F12h9omGvv48l5iWhYkuG%2Fvulnerabilities%20impacted%202.png?alt=media&#x26;token=a0503d1e-36e4-40b6-a197-d187e2cd72d2" alt=""><figcaption></figcaption></figure>

* Click the **Actions** column.

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2F6wdOP9bcO7YKgi3gboYy%2Fvulnerabilty%20create%20jira.png?alt=media&#x26;token=1ac16e4f-0613-4d2e-94e5-a380facf6c64" alt=""><figcaption></figcaption></figure>

* Click the **Create Jira Ticket** option.&#x20;
* An option to create the Jira ticket is displayed. Click **Create**.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FQezOJrct8HolEpujz4FF%2Fcteare%20jira.png?alt=media&#x26;token=1bd45b04-d1e8-4221-ac2e-11059c73158a" alt=""><figcaption></figcaption></figure>

### Smart Search

The smart search option in the Vulnerabilities details page is used to search for specific components based on Artifact, Component, Severity or Vulnerability.&#x20;

* Click in the **Search** dropdown. The available search options are displayed.

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FWSLo37ciyqPpUmVCs29k%2Fvulnerability%20search.png?alt=media&#x26;token=5df9fa51-12f2-48d7-8956-8191a425138a" alt=""><figcaption></figcaption></figure>

* Select the required option. A dropdown with the values specific to the selected option are displayed. For example: Vulnerability is selected as the search option as shown below:

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FJEB1MvOQQJDDOzv2NN1f%2Fvulnerability%20search%202.png?alt=media&#x26;token=1b8c093e-80d3-457c-af6b-55bb8d8eb54d" alt=""><figcaption></figcaption></figure>

* Select the specific vulnerability value for which you want to find the components, and press **Enter**. The components with the selected vulnerability are displayed.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FOfIzREZ6ncCRTCvnhtit%2Fvulnerability%20search%203.png?alt=media&#x26;token=d41720bf-2b18-4479-9135-ce4deaca7121" alt=""><figcaption></figcaption></figure>

* The displayed vulnerability page can be downloaded in either .CSV or .JSON or PDF formats by clicking the **Download** button provided at the top right corner as show below:

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2F91nfL6ZuCv6xiGG9xU4L%2Fvulnerability%20search%204.png?alt=media&#x26;token=304db060-b6b9-415e-805d-e17fd5579fc5" alt=""><figcaption></figcaption></figure>

The vulnerabilities can be searched from the Application Dashboard page also. The following example shows searching for the applications based on the **Vulnerability** in this page.

* Select **Vulnerability** from the search dropdown. Now enter the vulnerability name as shown below and press **Enter**. The applications with the given vulnerability are displayed.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FvxT7lTq4L2w7qNJ51yeV%2Fapplication%20vulnerability.png?alt=media&#x26;token=4c1d0f5b-4572-4ff7-82b3-5da288d3dea7" alt=""><figcaption></figcaption></figure>

* Select a application and click it. The environment in which the vulnerability is found is highlighted and the current deployments with the selected vulnerability are displayed as shown below.&#x20;
* Click on any **Vulnerability** count for the displayed active deployments.&#x20;

<figure><img src="https://2047464521-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MBEa1hoX6SqpDj-ymNs%2Fuploads%2FheN4BbLqcpkfQp5dGH2U%2Fapplication%20vulnerability%202.png?alt=media&#x26;token=15398788-df9c-4d1d-8198-51d828209abe" alt=""><figcaption></figcaption></figure>

* The vulnerabilities details page is displayed. Click search and select **Vulnerability** from the search options.&#x20;
* Now select the same vulnerability name from the displayed list. All the components related to the selected current deployment are displayed. &#x20;
