Tenable Queries

Tenable Queries are a set of pre-built, dynamically updating filters curated by Tenable Research to help you immediately focus on the most critical threats facing your organization.

Note: You access Tenable Queries based on specific Asset types and Findings types in Explore.

Tenable Queries in Explore

The table below lists the Tenable Queries available in Explore -> Assets, by asset type. These queries help you segment your environment by specific asset characteristics.

Tenable Query Asset Types Risk Focus Criteria Applied
External Assets (ASM) Host, Web Application Assets or domains discovered by Tenable Attack Surface Management, integrated with the steps described in Manage Integrations in the Tenable Attack Surface Management User Guide. Filter on assets integrated via the ASM process.
Network Devices Host

Assets identified as networking devices (e.g., routers, switches, firewalls, and SSL gateways).

Asset type filter for network device classifications.

 

The table below lists the Tenable Queries available in Explore->Findings, by findings type. These queries are driven by Tenable Research's threat intelligence to highlight vulnerabilities with the highest real-world risk, based primarily on the Vulnerability Priority Rating (VPR).

Tenable Query Findings Types Risk Focus Criteria Applied
AI Inventory Vulnerabilities, Web Application Findings AI-related Vulnerabilities and Web Application findings, including those identifying the presence of AI/LLM tools and services. Filter on Tenable plugins related to AI/LLM detection.
CISA Known Exploitable Vulnerabilities

Vulnerabilities that appear in the CISA Known Exploited Vulnerabilities Catalog.

The vulnerability's CVE appears in the CISA KEV Catalog.
Emerging Threats Vulnerabilities

Vulnerabilities being actively monitored by Tenable in three areas:

  • Vulnerabilities Being Monitored — Publicly discussed, but no exploit or proof of concept has been disclosed.

  • Vulnerabilities of Interest — Publicly discussed and have a proof of concept that could lead to widespread use by attackers.

  • Vulnerabilities of Concern — Widely discussed and large-scale abuse by attackers is being observed.

VPR Key Drivers such as Threat Source and Exploit Code Maturity.
In the News Vulnerabilities Vulnerabilities being widely reported in the press with notable public coverage over the past 30 days. Based on VPR Key Driver: Threat Sources.
Ransomware Vulnerabilities Vulnerabilities used in current or historical ransomware attacks, as determined from evidence gathered by the Tenable Research team. VPR Key Driver indicates association with ransomware.
Recently Exploited Vulnerabilities Vulnerabilities being leveraged by threat actors over an extended period of time in targeted attacks, ransomware, or malware campaigns. These vulnerabilities are curated by the Tenable Research team. VPR Key Driver: Threat Sources and Threat Recency .
Persistently Exploited Vulnerabilities Vulnerabilities being leveraged by threat actors over an extended period of time in targeted attacks, ransomware, or malware campaigns. These vulnerabilities are curated by the Research team. Curated by the Research team based on historical exploitation evidence.
Top 50 VPR Vulnerabilities, Web Application Findings The top 50 vulnerabilities by Vulnerability Priority Rating (VPR). The 50 unique vulnerabilities with the highest VPR score in your environment.
Note: For more information about Tenable Queries, see Vulnerability Categories.

Accessing and Using Tenable Queries

Tenable Queries are available in the Saved Views dropdown menu in Explore. When you select a Tenable Query, the table shows only the matching vulnerabilities.

To show Tenable Queries:

  1. In the left navigation, click Explore > Assets or ExploreFindings.

  2. To the left of the query builder, click Saved Views.

    A drop-down appears.

  3. Click Tenable Queries.

    A list of Tenable Queries appears.