Vulnerability Enrichment

Prev Next

Axonius uses a variety of sources to collect information on reported CVEs and enriches them with that information.

enrichment_diagram

Below is the list of enrichment sources used by Axonius and their icons. When viewing Vulnerability Instances on the relevant Assets page, the icon of the enrichment from which the vulnerabilities originate is displayed under the Adapter Connection column.

Out-of-the-Box Enrichment Sources

Name and Icon

Indicates

NVD NVDIcon

Indicates Vulnerabilities enriched with data from the NIST NVD database.

EPSS EPSSIcon

Indicates software vulnerabilities enriched with details from the Exploit Prediction Scoring System EPSS from connected adapters.

CISA CISA_logo_50x50

Indicates Vulnerabilities enriched with  vulnerabilities information from your connected adapters with additional details from the CISA Known Exploited Vulnerabilities (KEV) Catalog. When relevant, the CISA fields and information are available for viewing and querying in the Vulnerabilities module and Devices module. Only CVEs that are part of the CISA KEV Catalog will be enhanced.

MSRC MSRCVulnLogo

Indicates   software vulnerabilities enriched with details  from MSRC from connected adapters.

EUVD

A platform that offers information on security vulnerabilities from the European Union Vulnerability Database.

Adapter Enrichments

Configure the following adapters in Axonius to enrich vulnerabilities with them.

Name and Icon

Indicates

VulnCheck  Vulncheck

Indicates Vulnerabilities enriched with data from the VulnCheck enrichment enforcement action.

Intel 471 Enrichment  image.png

Provides cyber threat intelligence to assess, identify, and manage potential risks.

Mandiant Enrichment  image

Offers threat intelligence, incident response, and security consulting services to detect and mitigate advanced cyber threats.

Bastazo  image

A security platform that offers comprehensive attack surface management solutions.

Qualys Cloud Platform

Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. This adapter connects to the Qualys Cloud Platform service to import information about devices and vulnerabilities.