Exploitable by Malware

by Cody Dumont
December 17, 2013

This dashboard provides a detailed view into the exploitability of your network.  This series of components shows which vulnerabilities are exploitable by malware, and then compares the exploitability to attack frameworks.  The dashboard contains graphs that show exploitability to clients and servers, and exploitability to malware versus the exploit tools.  There are tables with a list of vulnerabilities and exploitable hosts, followed by a detailed matrix with an in-depth analysis of the exploitable vulnerabilities.

The dashboard and its components are available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments.

The dashboard requirements are:

  • SecurityCenter 4.7.1
  • Nessus 5.2.4

Listed below are the included components:

Exploitable by Malware - Exploitable Vulnerability Summary: Displays a summary of vulnerabilities that are exploitable by malware.

Exploitable by Malware - Top 100 Vulnerabilities Exploitable by Malware: Shows a top 100 summary of the vulnerabilities that have been identified to be exploitable using malware.  The table is sorted by the total host column, which counts the total systems affected by the specific vulnerability. 

Exploitable by Malware - Exploitable by Malware 7 Day Trend Analysis: Shows an additive trend analysis of vulnerabilities that can be exploited by malware.  The additive trend data is displayed for medium, high, and critical severity vulnerabilities.   

Exploitable by Malware - Exploitable Matrix: Displays an indicator matrix of exploitable vulnerabilities.  There are 4 columns showing the total exploitable vulnerabilities, followed by columns for severity levels.  The rows are organized by exploit framework, including the new tag “Exploitable by Malware”.   The first row shows the count of exploitable vulnerabilities.  The subsequent rows are broken down using the exploit frameworks.  The cells show the percentage of the exploitable vulnerabilities for each framework based on severity.  If 0% is present, then less than 1% of total vulnerabilities are identified and text is green with black text.  If 1% - 10% of vulnerabilities are exploitable by a framework, the cell is black on orange with a ratio-bar.   If 11 – 50% are exploitable by a framework, the cell is white on red with a ratio-bar.   If 51% – 100% are exploitable by a framework, the cell is white on purple with a ratio-bar.   

Exploitable by Malware - Top 100 Vulnerable Hosts: Provides a host summary of systems with vulnerabilities that are known to be exploitable by malware.

Exploitable by Malware - Exploitable Summary 7 Day Trend Analysis: Displays a detailed trend analysis for exploitable vulnerabilities, by exploit framework.  Each trend line shows the vulnerability for the respective exploit framework.  The trend analysis provides data points every 24 hours over the past 7 days, showing an additive count of vulnerabilities.