Weakness Details
In the Weaknesses view, you can view details for any weakness in the list.
To view weakness details:
-
Access the Weaknesses view.
-
In the row of the weakness for which you want to view details, click See details.
The weakness details page appears.
On the weakness details page, you can:
-
View the Weakness Name.
-
View the Severity Level of the weakness, for example, Critical.
Note: Because Tenable Exposure Management calculates CVEs using VPR and Tenable Cloud Security calculates using CVSS, you may notice a difference in severity across weaknesses between these applications. -
View the Vulnerability Priority Rating (VPR) of the weakness.
-
View the number of Impacted Assets associated with the weakness.
-
Click See Assets to scroll down to the full list of impacted assets.
-
-
View the Top Attack Techniques for the weakness.
Note: Because Tenable Exposure Management aggregates techniques by cause (for example, CVE, CWE) a single choke point may have multiple sources/targets. This may cause discrepancies in technique counts between the Weaknesses view and the sum of choke points within the Top Attack Techniques view.-
Hover over the priority to view the full breakdown of the techniques associated with the weakness, and their relative criticalities.
-
Click the metric to navigate directly to the Top Attack Techniques view, filtered automatically by attack path techniques that feature the weakness.
-
-
View the date at which the weakness was Last Seen in a scan on the asset.
-
View the date at which the weakness was First Seen in a scan on the asset.
-
View the date at which the weakness was Last Modified.
-
View the weakness' Publication Date.
-
View a Description of the weakness.
-
View a list of Properties associated with the weakness.
These can include, but are not limited to:
Note: The properties displayed in this section depend on the type of weakness for which you are viewing details.-
Weakness ID — The Common Vulnerability Exposure (CVE) ID associated with the weakness.
-
Weakness Type — The type of weakness: Misconfiguration or Vulnerability.
-
Detection Family — The detection family associated with detecting the weakness, for example, CVEs.
-
-
View a table list of the Impacted Assets associated with the weakness.
This list includes the following information:
-
Name — The asset identifier. Tenable Exposure Management assigns this identifier based on the presence of certain asset attributes in the following order:
-
Agent Name (if agent-scanned)
-
NetBIOS Name
-
FQDN
-
IPv6 address
-
IPv4 address
For example, if scans identify a NetBIOS name and an IPv4 address for an asset, the NetBIOS name appears as the Asset Name.
-
-
AES — The Asset Exposure Score for the asset. The AES represents the asset's relative exposure as an integer between 0 and 1000. A higher AES indicates higher exposure.
Note:Tenable Exposure Management does not calculate an AES for unlicensed assets.
-
Class — The class type associated with the asset. For more information, see Asset Classes.
-
Weaknesses — The weaknesses associated with the asset. For more information, see Weaknesses.
Tip: Click on a Weakness count to navigate directly to the Weaknesses view. -
Top Attack Techniques — Instances of MITRE Att&ck techniques associated with this asset that are used in attack paths leading to critical assets. For more information, see Top Attack Techniques.
Tip: Click a choke point to navigate directly to the Top Attack Techniques view on the Attack Path page, filtered automatically by techniques that feature the weakness.Note: Because Tenable Exposure Management aggregates techniques by cause (for example, CVE, CWE) a single choke point may have multiple sources/targets. This may cause discrepancies in technique counts between the Weaknesses view and the sum of choke points within the Top Attack Techniques view. -
Top Attack Paths — Instances of attack paths associated with this asset that lead to critical assets. For more information, see Top Attack Paths.
Tip: Click a choke point to navigate directly to the Top Attack Paths view on the Attack Path page, filtered automatically by attack paths that feature the weakness. -
Associated Tags — The number of tags applied to the asset. For more information on tagging an asset, see Tag Assets via the Assets Page.
-
Last updated — The date and time at which the asset was last updated.
-
Click See details to view more details about an asset. For more information, see View Asset Details.
-