This report provides a summary of critical severity vulnerabilities. The report has an executive summary chapter showing tables and trend graphs highlighting the status of critical severity vulnerabilities. The two following chapters provide the delta between critical severity vulnerabilities that are exploitable versus not exploitable. This report will provide a summary of information for critical vulnerabilities with exploits associated with several tools that include: Metasploit, Core Impact, or CANVAS scripts. This report is meant to be used during individual scans or to be executed after a scan as a post-processing event. This template can be used to generate a report on all critical findings within your environment.
The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Executive. The reports requirements are:
- SecurityCenter 4.7.1
- Nessus 5.2.4
- PVS 4.0
Executive Summary - This chapter provides a series of tables and charts to provide a summary view of critical vulnerabilities and the comparison to the exploitability of the vulnerability. The tables provide two views, one with vulnerabilities discovered over time in the last 30 days, and the other view of vulnerabilities to the exploit framework. The trend analysis provides a 6 month view of exploitable critical vulnerabilities and overall count of total critical vulnerabilities over the past 6 months.
Exploitable Vulnerability Summary - This chapter displays a summary of top exploitable critical vulnerabilities. The chapter contains a bar chart of the top 20 exploitable systems, a table of top 10 systems with system details, a port summary, and the top exploitable critical vulnerabilities.
Critical Vulnerability Summary - This chapter displays a summary of top critical vulnerabilities. The chapter contains a bar chart of the top 20 systems, a table of top 10 systems with system details, a port summary, and the top critical vulnerabilities.