Exploitable by Malware

by Cody Dumont
December 26, 2013

This report provides a detailed view into the exploitability of your network. The following chapters show which vulnerabilities are exploitable by malware, and then compares the exploitability to attack frameworks. The report contains graphs that show exploitability to clients and servers, and exploitability to malware versus the exploit tools. There are tables with a list of vulnerabilities and exploitable hosts, followed by a detailed matrix with an in-depth analysis of the exploitable vulnerabilities.

The report is available in the SecurityCenter 4.7 Report app feed, an app store of dashboards, reports, and assets.  The report requirements are:

  • SecurityCenter 4.7
  • Nessus 5.2.1

Chapters

Exploitable Vulnerability Summary - This chapter contains a series of data tables displaying the count of systems or vulnerabilities that are exploitable by known frameworks or by malware. Each table is broken down by exploit framework and severity level. The cells are also configured to change color based on the number thresholds.

Exploitable Trend Analysis - This chapter contains a series of charts and graphs that display the trend of vulnerabilities that can be exploited by malware and other frameworks. Two of the graphs provide a trend analysis over the past 7 days, using a data point every 24 hours.

Exploitable Top 10 Detail Systems and Vulnerabilities - This chapter contains two summary tables with a top 10 summary view of exploitable systems and the most common exploitable vulnerabilities. Each table contains detailed information to allow for more granular understanding of the current risk to an organization.