Views:

View important information regarding a specific CVE detected in your environment and any associated prevention and detection rules available from your integrated products.

CVE profiles provide detailed information regarding the CVEs detected in your organization's environment, the mitigation options available from your Trend Micro products, and any additional reference information for use in further investigation. The type of CVE determines what information is displayed in the profile.
To view the profile of a CVE, go to Operations Dashboard and select the Vulnerabilities risk factor in the Risk Factors tab. Then, click the Vulnerability ID of the CVE under Detected Vulnerabilities. You may also click the open in new tab icon (open_in_new_tab_icon=GUID-D37037A0-DD4F-4C8A-AB74-D8793D4F991A.png) next to the CVE in Network SecurityIntrusion Prevention Configuration.
To view the profile of a time-critical CVE, go to the Exposure Overview tab in Executive Dashboard and click View details in the corresponding security alert.
The following table details the tabs that can be displayed when viewing the profile screen for a CVE. Displayed tabs vary depending on the types of assets vulnerable to the CVE.

CVE Profile Tabs

Tab
Description
Basic
General information about the CVE
Devices
Lists your devices vulnerable to the CVE. Select a device to change the status of the CVE on the specified device. Filter devices by case ID. Select devices and use the Manage case menu to move assets between cases, remove assets from cases, or create a new case.
Hosts
Lists your internet-facing assets vulnerable to the CVE. Select a host to change the status of the CVE on the specified internet-facing asset.
Containers
Lists your cloud-based container clusters and images vulnerable to the CVE
Cloud VMs
Lists your cloud VMs and cloud data storage vulnerable to the CVE
Note
Note
Only EBS volumes that are attached to an EC2 instance are displayed when viewing by Cloud VMs. All EBS volumes are listed when viewing by Cloud data storage.
Threat Intelligence
Important
Important
This is a pre-release sub-feature and is not part of the existing features of an official commercial or general release. Please review the Pre-release sub-feature disclaimer before using the sub-feature.
Displays emerging threats and threat actors associated with the CVE as well as threat hunting queries you may use to search for associated threats in your environment
  • Click on the name of an emerging threat or threat actor to view the corresponding profile in Threat Insights
  • Click Execute Query in the entry for a threat hunting query to run the query in the Search app
  • Click Copy Query in the entry for a threat hunting query to copy the query to your clipboard
The following table details the information displayed in the Basic tab when viewing the profile screen for a highly exploitable unique CVE.

CVE Profile - Basic Tab

Section
Description
General
General information about the CVE
  • Global exploit activity: Determined by frequency in which the vulnerability is exploited globally and the expectation that the vulnerability might be exploited in the future
  • Published: The official publish date of the CVE
  • Description: The official CVE description
Displays available rules from Trend Micro products that can mitigate the risk posed by the vulnerability
Click the Rule ID/Malware Name corresponding to a product to see the available filter rule IDs, the ID status, and instructions on how to apply the rules.
Note
Note
All Trend Micro products with available attack prevention/detection rules display regardless of whether you have the product connected in your environment. For information about how to purchase Trend Micro products, contact your sales representative.
For more information on connecting products to Operations Dashboard, see Configuring data sources.
Important
Important
To locate and block the filter rules on all profiles using the TippingPoint Security Management System web management console, go to ProfilesInspection ProfilesGlobal Search.
Mitigation Options
Provides a set of recommended actions curated by Trend Micro threat experts that you can use to mitigate the selected vulnerability on applicable operating systems.
For some supported platforms, Trend Vision One automatically detects completed mitigation actions, sets the CVE status to Mitigated, and removes affected devices from the affected devices list. CVEs on some platforms are not supported for automatic detection, which means any mitigated devices may still remain on the affected devices list. Trend Micro still recommends you to complete mitigation actions on unsupported platforms to strengthen your security posture.
Reference
Displays additional reference links for the CVE
The following table details the information displayed when viewing the profile screen for a time-critical CVE.

Time-Critical CVEs

   
Details
General information about the CVE, including affected operating systems, the number of assessed devices in your environment, devices affected by the vulnerability, and the number of exploit attempts
Attack Prevention/Detection Rules
Displays available rules from Trend Micro products that can mitigate the risk posed by the vulnerability
Note
Note
All Trend Micro products with available attack prevention/detection rules display regardless of whether you have the product connected in your environment. For information about how to purchase Trend Micro products, contact your sales representative.
For more information on connecting products to Operations Dashboard, see Configuring data sources.
Mitigation Options
Provides a set of recommended actions curated by Trend Micro threat experts that you can use to mitigate the selected vulnerability on applicable operating systems.
Reference
Displays additional reference links for the CVE
Affected Devices
Devices in your environment vulnerable to the time-critical CVE
Trend Vision One analyzes detection logs to determine how often attackers have attempted to exploit the vulnerability on each endpoint.
  • Click All vulnerable devices to see all endpoints vulnerable to the CVE
  • Click Investigation recommended to see the endpoints with detected exploit attempts
  • Search for specific endpoints by name
  • Click any device or user name to see a detailed asset profile
  • Select a device to change the status of the CVE on the selected device.