#
Vulnerabilities
Likely the exposure of most value to your organization are Vulnerabilities. These consist of any exploit of significant risk we can identify on your attack surface. They are found by combining Assets and Exposures across your attack surface into a series of steps that comprise a risk greater than the sum of its parts. You will be alerted through Email and in product to High and Critical severity vulnerabilities. After discovering a vulnerability, NetSPI will routinely check for the continued existence of it, and when remediated, automatically update it to remediated.
#
Working with Vulnerabilities
- From the Exposures page, select any of the Vulnerabilities dashboard elements to display the Vulnerabilities page (or select the Expand icon
in the upper right).
The table below calls out some of the high-level functionality on the Vulnerabilities page.
- Select any CVE in the Vulnerabilities details to display the Vulnerability details page with associated CVE information listed. You can also hover over any row in the Assets table to display the View Details icon
to display the Vulnerability details page.
#
Vulnerabilities Details Page Functionality
You can view the CVSS and EPSS* scores for the CVEs associated with a vulnerability along with the dates NIST created the CVE (Published) or last modified the CVE (Last Modified) on the Vulnerabilities details page.
* See EPSS at https://www.first.org/epss.
Select the linked CVE name to open a browser tab to the NIST website with full details for the CVE.
See the new CVE API endpoints here and CVE information in Domains, IPs, and Ports.
See the sections below for further actions you can take on the Vulnerabilities details page.
#
Display CVEs in Explore or Table Format
Select the Explore or Table icons to display the CVEs in two different formats. Table format gives you the option to add or remove columns that display.
Note that you can add or remove columns that display in the CVE table view by selecting the gear icon in the table's footer to display the Customize Columns dialog box.
CVEs that display in the Explore and Table views will be either v2 or v3 (ASM supports both). If you'd like to see which version is used for any given CVE vulnerability, select Table view and then select the gear icon in the table's footer to display the CVE column picker. Downloading a CSV of that table will include all displayed data.
#
Search, Filter, and Sort CVEs
You can search, filter, and sort CVEs by multiple criteria.
- Search and filter all CVEs or only the CVEs you've selected for monitoring by selecting the options from the CVEs drop-down list.
- Sort CVEs by CVSS or EPSS scores from low -> high or high -> low by selecting the Table view and then selecting the CVSS or EPSS column header to toggle between ascending and descending order.
#
Export CVEs in CSV Format
Export the CVEs in a CSV format by selecting the Table view icon. Selecting the CSV export icon will export all CSV vulnerability information for your organizations' assets.
#
Configuring CVEs for Monitoring
Use the steps below to configure CVEs for monitoring.
You must have Admin-level access in the ASM application in order to configure CVE monitoring. ASM synchronizes weekly to pull in any updated CVE, CVSS, and EPSS data.
- Select Settings from the left navigation to display the Settings page and then select the CVEs tab.
- Enter CVE numbers that you want to monitor and select Save CVEs. CVEs that you enter here will display with a red flag in the
CVEs table , allowing you to easily filter and display only those CVEs that are most critical to you.
#
Vulnerability Definitions
The table below provides brief definitions for the terms used in providing scores for the vulnerabilities ASM finds.
#
Vulnerability Triggers
Vulnerability triggers can be used by admins to automatically generate vulnerabilities based on custom search results. To create a vulnerability trigger, go to the table view for either ports, domains, IPs or certificates. Enter a search term, and then click the bell icon that appears to the right of the search box. If no bell icon appears after you've entered a search term, confirm that you are assigned as an admin for your tenant.
Within the vulnerability trigger creation modal, you can provide your trigger with a name and description, review its trigger query, and provide details for the vulnerabilities that it will generate from new query results. Once the trigger is saved, the query will be executed periodically, and any new results will have vulnerabilities generated for them.
Note that any results that are returned by your search term when you first create your trigger will be ignored. Only new results will be processed by the trigger. Also, if your trigger ever returns more than 30k new results at one time, it will be temporarily disabled and support will be notified.
If you need to disable, delete, or edit your trigger, you can do so in settings. Select the 'Vulnerability Triggers' tab and choose the trigger you want to update.
#
Vulnerability Reporting Guidelines
Our focus is on discovering, validating, and exploiting high-impact vulnerabilities to ensure the confidentiality and integrity of your systems and user data. This below provides an overview of which vulnerabilities are in scope and should be reported, and which ones are out of scope and are not reported.
#
In Scope Vulnerabilities
The following vulnerabilities are In Scope and are reported:
- Remote Code Execution
- Domain & Subdomain Takeover
- Injection Attacks
- SQL Injection
- Command Injection
- Code Injection
- Cross-Site Scripting (XSS)
- XML External Entity Injection (XXE)
- Broken Access Controls
- Insecure Direct Object Reference (IDOR)
- Missing Function Level Access Control (MFLAC)
- Authentication/Authorization Bypass
- Privilege Escalation
- Information Disclosure
- Sensitive Information Disclosure
- PII
- Private Keys
- Auth Tokens
- Passwords
- Directory Listings
- Verbose Error Messages (stack traces, application or server errors, path disclosure)
- Sensitive Information Disclosure
- Cross-Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- Insecure Protocols
- Telnet
- FTP
- SNMP
- Remote Management Interfaces
- SMB
- Database Service Available
- MySQL
- MSSQL
- Oracle
- PostgreSQL
- MongoDB
#
Out of Scope Vulnerabilities
The following vulnerabilities are Out of Scope and are not reported:
- Clickjacking
- Cross-site Request Forgery (CSRF) with minimal security implications (Logout CSRF, etc.)
- Denial of Service Attacks
- Deprecated SSL/TLS versions and ciphers
- Email Spoofing (including SPF, DKIM, and DMARC)
- Host header issues without a proof-of-concept demonstrating vulnerability
- Injection Attacks
- CSV injection
- Cross-Site Scripting (XSS) issues that affect only outdated browsers
- Cross-Site Scripting (XSS) that can only be executed against yourself (Self-XSS)
- Text injection
- Information Disclosure
- Internal IP Address
- Server/Software Versions
- Non-sensitive files and directories (e.g. README.TXT, CHANGES.TXT, robots.txt, .gitignore, etc.)
- Lack of rate limiting
- User Enumeration
- Username or email enumeration by brute forcing login pages, forgot passwords, etc…
- WAF bypass
- Missing HTTP security headers
- Missing Secure and HTTPOnly cookie flags
- Open Redirects without demonstrating additional security impact (such as stealing auth tokens)
- Out-of-Date software without a proof-of-concept demonstrating vulnerability
- Reflected file download
- Default/Test Pages (Apache, Apache Tomcat, IIS, etc…)
- NTP Configurations (Mode 6, Clrtrap, Monlist, etc…)