Vulnerability Information

On the Vulnerability Profile page, the Vulnerability Information section provides a short summary along the vulnerability's Vulnerability Priority Rating (VPR), Common Vulnerability Scoring System (CVSSv3), and Exploit Prediction Scoring System (EPSS) scores.

It also contains tabs which allow you to delve further into your vulnerability data by viewing an event timeline, VPR and EPSS widgets, plugin details, known affected products, and more.

At the top of the section, you can:

  • View a brief description of the vulnerability.

  • View a tile that indicates the VPR of the vulnerability.

    • Click the button to switch between viewing VPR and VPR (Beta) scores. For more information, see CVSS vs. VPR.

      Note: This toggle affects all data on the Vulnerability Information page.
      Tip: For more information, see the Scoring Explained Quick Reference Guide.
  • View a tile that indicates the CVSS of the vulnerability.

    • Click the button to switch between viewing CVSSv2 and CVSSv3 scores. For more information, see CVSS vs. VPR.

      Note: This toggle affects all data on the Vulnerability Information page.
  • View a tile that indicates the EPSS (Exploit Prediction Scoring System) score of the vulnerability.

Events

The Events tab appears by default and contains a timeline for the vulnerability. Use the horizontal scroll bar or click an event marker to go to that event. Click event links to open them in your web browser.

Tip: Use the toggle in the upper-left corner of the timeline to switch between viewing VPR and VPR (Beta) data within the events timeline.

The timeline can contain the following events:

Event

Description

Discovery Date

When Tenable first observed the vulnerability.

NVD Published

When the National Vulnerability Database (NVD) disclosed the vulnerability.

First Tenable Coverage

The first time Tenable provided coverage for the vulnerability.

First Proof of Concept

When Tenable first observed a proof of concept for the vulnerability.

First Functional Exploit When the first functional exploit for the vulnerability was released.
Consec Plugin Published Indicates that a new Container Security Scanner plugin for the vulnerability is available.
LCE Plugin Published Indicates that a new Log Correlation Engine plugin for the vulnerability is available.

Nessus Plugin Published

Indicates that a new Tenable Nessus plugin for the vulnerability is released.

NNM Plugin Published Indicates that a new Tenable Network Monitor plugin for the vulnerability is available.

WAS Plugin Published

Indicates that a new Tenable Web App Scanning plugin for the vulnerability is available.

Ransomware

When Tenable first observed ransomware events for the vulnerability.

Malware When Tenable first observed malware events for the vulnerability.
Emerging Threats

Indicates that Tenable is actively monitoring the vulnerability since it is being publicly discussed, has a viable proof of concept, and/or is widely used.

Exploited in the Wild Indicates that the vulnerability has been used in a cyberattack.

Persistently Exploited

Appears when Tenable observes that the vulnerability is being persistently exploited.

CISA Known Exploits

When the Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to their Known Exploited Vulnerabilities catalog.

CISA Due-Date When federal agencies must fix vulnerabilities on the CISA Known Exploited Vulnerabilities (KEV) list.
Cyber Exposure Alert

Appears when Tenable publishes a Cyber Exposure Alert for the vulnerability.

EPSS Increased Appears when the Exploit Prediction Scoring System (EPSS) increases.
EPSS Decreased Appears when the EPSS decreases.
EPSS Assigned Appears when an EPSS score is assigned.
VPR Increased Appears when the Vulnerability Priority Rating (VPR) increases.
VPR Decreased Appears when the VPR decreases.
VPR Assigned Appears when a VPR score is assigned.
VPR (Beta) Increased Appears when the Vulnerability Priority Rating (VPR) Beta increases.
VPR (Beta) Decreased Appears when the VPR (Beta) decreases.
VPR (Beta) Assigned Appears when a VPR (Beta) score is assigned.

Scores

The Scores tab contains ring charts for VPR, VPR (Beta) and EPSS along with trend charts to track how these scores have changed over time. Additionally, you can compare your score data across two points in the Key Drivers sections to the left of the charts.

On the Scores tab, you can:

  • Hover over a point on the graph to see the score on that date.

  • Click a point on the graph to update the data comparison in the Key Drivers sections.

  • View the following VPR Key Drivers:

    VPR Driver

    Description

    Age of Vulnerability

    The number of days since the vulnerability was discovered.

    CVSSv3 Impact Score

    The NVD-provided CVSSv3 impact score from 0–10. If NVD did not provide a score, Tenable generates one.

    Exploit Code Maturity

    The highest level of exploit maturity for the vulnerability: Unproven, PoC, Functional, or High. Drawn from Tenable’s research, as well as key external sources.

    Product Coverage

    The relative number of unique products affected. Values are Low, Medium, High, or Very High.

    Threat Intensity

    The number and frequency of recent threat events. Values are Very Low, Low, Medium, High, or Very High.

    Threat Sources

    Sources where relevant threat events occurred (for example, social media or the dark web). If no events were observed in the past 28 days, No recorded events appears.

    Threat Recency

    The number of days since a threat event occurred, from 0–180.

  • View the following VPR (Beta) Key Drivers:

    VPR Driver

    Description

    Exploit Chain

    Indicates whether the vulnerability is present as part of an exploit chain.

    Exploit Code Maturity

    The highest level of exploit maturity for the vulnerability: Unproven, PoC, Functional, or High. Drawn from Tenable’s research, as well as key external sources.

    In the News, Intensity Last 30 days

    Indicates whether the vulnerability has a high volume or frequency of media mentions in the last 30 days.

    In the News Recency

    Indicates whether recent media attention is a significant factor in the VPR (Beta) score.

    In the News Sources Last 30 days

    Indicates whether the is affected by the number or variety of news sources reporting on it within the last 30 days.

    Malware Observations Intensity Last 30 days

    Indicates whether the vulnerability has a significant volume of associated malware observations in the last 30 days.

    Malware Observations Recency

    Indicates whether the vulnerability is influenced by very recent observations of associated malware.
    Score The numerical Vulnerability Priority Rating (Beta) score value.

    On CISA KEV

    Indicates whether the vulnerability is listed on the CISA Known Exploited Vulnerabilities list.

    Targeted Industries

    Indicates whether the vulnerability is driven by evidence of targeting specific industries.

    Targeted Regions

    Indicates whether the vulnerability is part of active exploitation observed in particular geographic regions.

    VPR Percentile

    The vulnerability's VPR (Beta) score percentile ranking, indicating its position relative to other vulnerabilities.

    VPR Severity

    where the overall severity categorization of the VPR (Beta) for the vulnerability, for example, Critical, High, Medium, Low, or Info.

Plugins

The Plugins tab lists plugins that detected findings for the vulnerability. From the Source drop-down, choose between Tenable Web App Scanning and Tenable Nessus.

Column

Description

Plugin ID

The ID of the Tenable plugin that detected the finding.

Name

The name of the Tenable plugin that detected the finding.

Family

The type of plugin. For example, with a Tenable Nessus plugin, Backdoors. Or, with a Tenable Web App Scanning plugin, Code Execution. To learn more, see About Plugin Families on the Tenable website.

Severity

The severity of the vulnerability as Low, Medium, or High.

Products

In the Products tab, view affected products by vendor. Next to a vendor, click the drop-down > to view a list of products.

For example, a vulnerability might have the Vendor canonical with the Product linux.

Tip: Tenable curates this data. It represents all known affected products for a vulnerability, not only yours. To view only your affected products, go to How Does This Affect Me.

Summary

In the Summary tab, view a summary and Copy it to your clipboard.

Threat Summary (Beta)

In the Threat Summary tab, view a summary of the threats associated with the vulnerability and Copy it to your clipboard.

Remedation Summary (Beta)

In the Remediation Summary tab, view a summary of the remediation steps you can take to mitigate the vulnerability and Copy it to your clipboard.