Skip to main content

Cyware Fusion and Threat Response

Vulnerabilities

Vulnerability refers to a security flaw in the software or a system that can leave it open to cyber attacks. It can also be related to any flaw that causes a threat to the confidentiality, integrity, and availability of data. Computer users and network personnel can protect computer systems from vulnerabilities by keeping software security patches up-to-date. This helps the incident response team manage the vulnerabilities and threats efficiently related to them and helps drive the process toward providing a timely response.

To view the vulnerabilities, go to Menu > Vulnerabilities. You can perform the following activities to manage vulnerabilities:

  • Search and filter vulnerabilities.

  • Reorder the vulnerabilities based on the ascending or descending order of the vulnerability titles.

  • View the vulnerabilities in the following view types:

    • List

    • Priority

    • Risk

    • Status

  • Sort the vulnerabilities based on the following criteria:

    • Relevance

    • CVSS Score

    • Days Overdue

    • Last Updated

    • Date Opened

  • View activity logs of the vulnerabilities.

  • Export the vulnerabilities.

  • Refresh the vulnerability list to view the latest data. To refresh the vulnerabilities list, on the top-right corner, click More > Refresh.

  • View the vulnerability list in full-screen mode. To view the vulnerabilities list in full-screen mode, on the top-right corner, click More > Full Screen.

  • View details of vulnerabilities retrieved from Intel Exchange. To view details, hover over the vulnerability and click View Details. For more details, see Connect the Dots.

    Note

    This feature is available in Respond v3.4.2 onwards.

For more information on managing the vulnerability listing page, see Manage Module Listings.