Weaknesses

Weaknesses are vulnerabilities and misconfigurations on your assets. The Weaknesses tab on the Inventory page highlights weaknesses on your assets and provides useful insights into those weaknesses, including descriptions, assets affected, criticality, and more.

Note: Only Active and Resurfaced vulnerabilities count towards your weaknesses.

To access the Weaknesses tab:

  1. Do one of the following:

    • In the left navigation menu, click Inventory > Weaknesses.

    • At the top of the Inventory page, click the Weaknesses tab.

    The Weaknesses tab appears.

In the Weaknesses tab, you can:

  • View the total number of weaknesses on assets within your container.

  • View the total number of new weaknesses discovered within the last 7 days.

  • View the total number of new weaknesses with a Vulnerability Priority Rating (VPR) greater than 7.

  • In the weakness type drop-down, filter the list by the following weakness types:

    • All Weakness Types

    • Misconfigurations

    • Vulnerabilities

    The weakness numbers at the top of the page and the weakness list update accordingly.

  • Use the Search box to search for a specific weakness in the list.

  • View a list of your weaknesses, including the following information:

    • Weakness Name — The Common Vulnerability Exposure (CVE) ID associated with the weakness.

    • Description — A brief description of the weakness.

    • Weakness Type — The type of weaknesses: Misconfiguration or Vulnerability.

    • Severity — The severity of the weakness, for example, Critical.

      Note: At this time, Tenable Exposure Management does not include information for Info level severity weaknesses.
      Note: Because Tenable Exposure Management calculates CVEs using VPR and Tenable Cloud Security calculates using CVSS, you may notice a difference in severity across weaknesses between these applications.
    • VPR Score — The Vulnerability Priority Rating (VPR) of the weakness.

    • Impacted Assets — The number of assets impacted by the weakness. For more information, see Assets.

    • Top Attack Techniques — Instances of MITRE Att&ck techniques associated with this asset that are used in attack paths leading to critical assets. For more information, see Top Attack Techniques.

      Tip: Click a choke point to navigate directly to the Attack Techniques tab on the Attack Path page, filtered automatically by techniques that feature the weakness.
      Note: Because Tenable Exposure Management aggregates techniques by cause (for example, CVE, CWE) a single choke point may have multiple sources/targets. This may cause discrepancies in technique counts between the Weaknesses tab and the sum of choke points within the Top Attack Techniques tab.
    • Last seen — The date at which the weakness was last seen in a scan on the asset.

    • Sources — The application the weakness' asset originated from, for example, Tenable Vulnerability Management.

    • Click See details to view more details about a weakness. For more information, see View Weakness Details.