Vulnerabilities

View information about the Vulnerabilities risk factor, which is determined by highly exploitable CVEs detected on you managed assets.

Trend Micro analyzes your environment to identify any high priority at-risk vulnerabilities in your organization using global activity data, CVE information, and local detection activity to produce customized vulnerability assessment scores for each asset. The Vulnerabilities risk factor contributes to the Exposure Index.

Note:

For more information about supported operating systems and applications, see Vulnerability Assessment System Requirements.

The tabs of the Highly-Exploitable CVEs widget display CVEs detected on your internal, internet-facing, and container assets. Mitigating the vulnerabilities with the highest CVE impact score, global exploit activity, or CVSS score is an effective way to reduce the Risk Index.

  • Click Data sources or Import Third-Party Data to configure data sources for CVE information.

  • Click a vulnerability ID to view detailed information on the CVE Profile screen.

The following table outlines the widgets available in the Vulnerabilities section.

Widget

Description

Vulnerability Management Metrics

View information about CVEs and operating system vulnerabilities effecting your organization.

  • The Patch Management section displays the average number of days it takes your organization to patch highly exploitable CVEs and average days that highly exploitable CVEs remain unpatched.

    For more information, see Mean Time to Patch (MTTP) and Average Unpatched Time.

    Important:

    For customers that signed up for or expressly updated Trend Vision One after July 3, 2023, Patch Management is only visible for users with full management scope.

  • The Highly Exploitable CVEs section displays information about the amount of highly exploitable CVEs effecting your devices, hosts, and container clusters.

    For more information, see Highly-Exploitable CVE Density and Vulnerable Endpoint Percentage.

  • The Legacy Operating Systems section displays the number of endpoints in your organization still running legacy Windows operating systems.

Highly Exploitable Unique CVEs

Lists devices, hosts, and containers with highly exploitable CVEs.

Important:

For users that signed up for or expressly updated Trend Vision One after July 3, 2023, additional details are only available for devices within the management scope of the current user.

The following table describes the risk indicators associated with the Vulnerabilities risk factor.

Indicator

Description

Data Sources

Target

OS vulnerability

The detection of exploitable operating system vulnerabilities on the endpoint

  • Endpoint Sensor

  • Trend Vision One Container Security

  • Trend Cloud One - Endpoint & Workload Security

  • Nessus Pro

  • Rapid7 - InsightVM

  • Rapid7 - Nexpose

  • Tanium Comply

  • Tenable.io

  • Qualys

  • Device

Application vulnerability

The detection of exploitable application vulnerabilities on the endpoint

  • Endpoint Sensor

  • Trend Vision One Container Security

  • Trend Cloud One - Endpoint & Workload Security

  • Nessus Pro

  • Rapid7 - InsightVM

  • Rapid7 - Nexpose

  • Tanium Comply

  • Tenable.io

  • Qualys

  • Device

Zero-day vulnerability

The detection of exploitable zero-day vulnerabilities on the endpoint

  • Endpoint Sensor

  • Device