Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Network Service Vulnerability Report

by Josef Weiss
October 25, 2016

Network service applications are applications running on a host/server that provide some service to a client on another host. Network services, such as Apple Bonjour, Samba, Netflow, and many others provide critical applications and services that are used extensively by many organizations. Many organizations rely on these network applications for file and print services, the monitoring and collecting of information, and edge and cloud services.

Using this report, analysts will obtain the latest information on vulnerabilities discovered on network services. The report displays information for enforcing and verifying IT management policies relating to network applications, such as vulnerability, configuration, and remediation policies. Analysts can use this information to reduce network applications vulnerabilities, which can be useful in strengthening existing IT management policies.

The chapters in this report leverage data gathered by active vulnerability scanning with Tenable Nessus and passive vulnerability detection with Tenable Passive Vulnerability Scanner (PVS). The data collected is filtered to provide insight into the vulnerabilities related to network service software in the environment. Vulnerabilities are tracked by time, severity, and exploitability in order to provide a more complete view of the security status of the network. Security teams can use this report to assist in identifying, monitoring, and remediating vulnerabilities within network service applications that may expose their organization to risk.

The report uses the Common Platform Enumeration (CPE) filter to identify many of the software programs used in enterprise networks. According to NIST, the CPE is a structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name. Tenable assigns CPEs to plugins where appropriate. This allows for analysts to search for common CPE prefixes such as cpe:/a:apple:bonjour, cpe:/a:cisco:netflow, and others. Associating CPE strings with vulnerabilities allows the analysts a greater view into separating operating system vulnerabilities from application vulnerabilities, and adds to the level of vulnerability detail provided to the organization.

This report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments.

The report requirements are:

  • SecurityCenter 5.3.1
  • Nessus 6.8.1

Tenable SecurityCenter provides extensive network monitoring by leveraging a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. SecurityCenter is continuously updated to detect advanced threats and vulnerabilities. Tenable constantly analyzes information from our unique sensors, delivering continuous visibility and critical context and enabling decisive action that transforms the security program from reactive to proactive. Continuous vulnerability analysis enables security teams to more effectively tailor remediation efforts. Monitoring the network to ensure that all systems are secured against vulnerabilities is essential to ongoing security efforts. Tenable’s extensive network monitoring capabilities can verify that systems are successfully scanned regularly and secured against vulnerabilities, enabling ongoing improvements to an organization’s security posture.

The corresponding dashboard can be found here:

Network Service Vulnerability Dashboard

The following chapters have been developed to provide a quick visual representation of the number of systems certain applications are installed on, the number of vulnerabilities, ratio of vulnerable systems, and percentage of systems that are currently exploitable. Vulnerability Trend displays application vulnerabilities over the last 90 days. By default, trend data is only stored for 30 days, and must be set to 90 days in SecurityCenter. Vulnerability observed dates are set to the last 3 days within the trend as well.

The report contains the following chapters:

  • Executive Summary – This chapter contains elements that present a visual overview of various defined technologies by row, and enumerates any found vulnerabilities across the columns. Included elements present the number of critical, high, and medium vulnerabilities, displayed across three columns, as well as the number of days they have been detected. The Network Services Trend presents a trend of the number of vulnerabilities by installed application over the last 90 days.
  • Network Services Vulnerability Status Report – This chapter gives a quick status report on patching efforts. The number of critical, high, and medium vulnerabilities is displayed across three columns, as well as the number of days they have been detected.
  • Network Services Critical Vulnerability Information – The Network Services Critical Vulnerability Information chapter displays the most critical vulnerabilities in a text format for a fast, readable reference without having to do a deep dive.
  • Network Services Detailed Vulnerability Summary –This chapter reports the number of systems on which the technology has been located in terms of critical, high, and medium vulnerabilities. The tables display the total number of identified vulnerabilities, including the associated repository, DNS, NetBIOS, MAC address, and IP address of the vulnerable systems for each network services vendor. Each element in this chapter provides detailed information about network service vulnerabilities that could impact critical systems and services within the organization.
Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.