Aggregated Security Findings Page

Explore the Aggregated Security Findings page for a comprehensive view of cybersecurity vulnerabilities, enabling prioritization based on asset criticality and potential impact.

Use Aggregated Security Findings to see a consolidated view of all the vulnerabilities in your organization from all sources. The Aggregated Security Findings page delivers increased visibility into cybersecurity vulnerabilities and risks. It helps security, IT, and risk teams identify vulnerabilities across fleets of assets, enabling them to prioritize vulnerabilities based on asset criticality, potential impact, and recognized threats.

A vulnerability is a software defect that could allow hackers to gain control of a system. Axonius presents vulnerabilities as defined by the Common Vulnerabilities and Exposures (CVE) list. Axonius discovers vulnerabilities by extracting CVE information fetched from adapters.

📘

Note

Some adapters, such as Tenable.sc, require selecting the Fetch Vulnerabilities advanced setting before viewing their vulnerability information on the Aggregated Security Findings page.

To access the page, from the Assets menu, expand Exposures and select Aggregated Security Findings.

The total number of unique devices on which vulnerabilities were found is shown above the Aggregated Security Findings table. Click on the number of devices to open the devices on which vulnerabilities were found on the Devices page.

Count

Aggregated Security Findings Fields

Fields displayed on the Aggregated Security Findings page include:

  • Adapter Connections - shows the icons of the adapter connections or enrichment from which the Aggregated Security Findings originate.

  • Vuln ID - The identifier of the vulnerability. This can be either a CVE ID or a different vulnerability identifier provided by some adapters.

    • When the value is a CVE ID, it contains is a clickable link to the CVE details in the NIST National Vulnerability Database (NVD).

    • When the vulnerability identifier isn't a CVE type but is fetched from an adapter, such as from a Tenable adapter, the vulnerability ID appears without a CVE prefix. When a link is available for a specific vulnerability identifier, you can click it to learn more about the vulnerability and how to remediate it.

      📘

      Note

      For supported adapters that fetch "non-CVE" vulnerability identifier information:

      • A prefix of the adapter appears before the value displayed in the Vuln ID column.

      • An optional Is CVE column displays ‘No’ for non-CVE vulnerabilities and ‘Yes’ for CVE vulnerabilities.

  • Device Count - The Device Count shows the number of devices affected by this specific vulnerability. Click a Device Count to open the Devices page with the devices affected by this vulnerability. Devices present Total CVE Count by Severity. CVEs are only counted if the CVE was validated on NVD.

  • Software Name and Software Vendor - When a CVE is applicable for multiple software, these fields are populated as "Multiple Software" and "Multiple Vendors".

  • NVD published date - The date the vulnerability was added to the NVD database.

  • NVD Modified date - The date the vulnerability was modified.

  • CVSS -Common Vulnerability Scoring System (CVSS), a numeric score used to supply a qualitative measure of severity. The CVSS rating is fetched from the source (v2,0, v3.0, v4.0, etc.).

  • CVE Exploitability Score - How likely it is that a vulnerability will be exploited according to NIST.

  • EPSS Score - How likely it is that a software vulnerability will be exploited in the wild according to EPSS.

  • CVE severity -NONE, LOW, MEDIUM, HIGH, CRITICAL, UNTRIAGED, NEGLIGIBLE, INFO, MODERATE, SERIOUS, SEVERE, URGENT, or CRITICAL value which are based on the CVSS rating.

  • CVE description, Synopsis, and Reference

  • CVE Vector information

  • First Seen, Last Seen - The time when an adapter first or last detected the vulnerability.

Not all available fields are displayed by default. Use Edit Columns to add or remove columns. See Setting Page Columns Display for more information.

You can add the CWE ID column to view corresponding vulnerabilities appearing in the Common Weakness Enumeration (CWE) list. Click a specific CWE ID link to learn more about the vulnerability and how to remediate it.

Data Enrichments

Axonius uses a variety of sources to collect information on reported CVEs and other Security Findings, and enriches them with that information. The icon of the enrichment from which the vulnerabilities originate is displayed under the Adapter Connection column. See Vulnerability Enrichment for detailed information on the enrichment sources.

CVE Vector Information

To view CVE Vector information add these columns to the Aggregated Security Findings page. See Setting Page Columns Display for more information.

The following fields are available:

VectorAvailable in CVSS VersionNotes
CVE Vector: Access Complexity2.XDescribes whether the access complexity is low, medium, or high
CVE Vector: Access Vector2.XDescribes whether the Access Vector is local or on a network
CVE Vector: Attack Complexity3.X
CVE Vector: Attack Vector3.X
CVE Vector: Authentication2.0Returns None if no CVE Vector Authentication exists
CVE Vector: Availability
CVE Vector: Confidentiality
CVE Vector: Integrity
CVE Vector: Privileges Required3.XReports whether privileges or required, and what level, if known
CVE Vector: Scope3.X
CVE Vector: User Interaction3.X
CVE Vector: Version3.1, 3.0, 2.0

Creating Queries on Aggregated Security Findings

Use Queries on the Aggregated Security Findings page to create a unique set of queries. Create queries using either of the following modes:

  • Query Wizard (the default) - Create a query using the Query Wizard, or in the query bar, selecting a saved query or writing a query.

  • Basic mode - Create a query by selecting filters. Learn more and how to create Queries in Basic mode.

Aggregated Security Finding queries with the Query Wizard are created on two levels:

  1. The first level of the query focuses on vulnerability parameters: fields such as the CVSS score, severity, or attack vector.
  2. The second level queries devices, such as operating system, installed software, or the last update date. Use these queries to find out which critical vulnerabilities exist and whether they impact critical assets in your environment; or, how many vulnerabilities exist, and whether they appear on devices with open ports/a specific patch applied.

After running the query, the table shows the vulnerabilities queried, filtered by the devices they affect. For example, this query shows vulnerabilities with the CVSS score over 8, only on devices where the operating system is Windows:

📘

Note

While it's recommended to get more context for the results, you don't have to fill in the Device section of the query to find vulnerabilities in your environment.

To learn more on Axonius queries, see Working with the Query Wizard and Saved Queries.

Refining the Device Count Displayed from Device-based Fields in Aggregated Security Findings

It can be very useful to refine the device count displayed for device connected fields in Aggregated Security Findings. For example, in this query:

  1. Build a query on an Aggregated Security Finding field on the table, such as CVSS Severity is High.
  2. Filter the findings displayed by a Device query to show the Aggregated Security Finding in your environment by a defined Device query, such as Windows Devices.
  3. After running the query, the table shows the Aggregated Security Findings queried, filtered by the devices they affect.

Once you get results for a query like this, to further refine the device count for such a query, use the Data Refinement field on the Device Count column for unique Aggregated Security Findings fields that are found on devices. For example: there might be 50 devices with CVSS Severity is High, and 20 with Mitigated Yes (and 30 with Mitigated no). To display the number of devices where both Mitigated Yes matches those exact devices who also have CVSS Severity is High, perform the following data refinement:

  1. Click the Refine Data (filter) icon next to the Device Count column.


  2. From the Refine Data dialog, under Device related asset entities - refine by condition, the Security Finding complex object field is pre-selected on the first row. From second row select the device-related Aggregated Security Finding field that you want to filter by and click Done.
    For example, select Mitigated yes to display the exact number of devices where the selected Aggregated Security Finding on them has a mitigated field with yes.


The Aggregated Security Findings page now shows the device count that matches the number of devices on which the vulnerabilities were found. If the device count is zero the row is hidden. Click on the Device Count to open these devices on the Devices page.

You can also refine the data displayed on the Aggregated Security Findings page in additional ways.

Additional Actions on the Aggregated Security Findings page

From Aggregated Security Findings page you can perform the following actions on the data:

Displaying Historical Data

Exporting Asset Data to CSV

Tagging Assets

Adding Custom Data to Assets

And more actions as detailed in the Asset Actions page.

Managing Exclusions

You can manage exclusions from the Aggregated Security Findings page.

To add an Aggregated Security Finding to a rule, hover over a row and click the Exclude button, or select one or more items and then click Exclude. The Create Exclusion Rule dialog opens with the Aggregated Security Finding(s) you selected filled in.

Learn more about creating Vulnerabilities Exclusion Rules.

Using Aggregated Security Findings Queries in Enforcement Actions

The following Enforcement Center Actions can be used with Aggregated Security Findings queries:

For more details on creating and working with Enforcement Actions, see Creating Enforcement Sets.