0
10.8.0
Yokohama, Xanadu, Washington DC, Vancouver
Shodan Exploit Integration for Security Operations imports exploit information that helps you prioritize the vulnerabilities in your environment based on risk.
By setting up this integration, you enrich your vulnerabilities with exploit information such as:
- Whether there are any exploits associated with a vulnerability.
- What the exploit code rank is. This tells you the skill level required to exploit the vulnerability (Novice, Intermediate, or Expert).
- Exploit Attack Vector. This helps you understand if the vulnerability can be remotely exploitable.
This integration enables exploit information enrichment that helps you understand the following exploitability metrics to prioritize the remediation of vulnerabilities:
- Is there an exploit associated with the vulnerability?
- What is the exploit code rank? This is used to derive the skill level required to exploit the vulnerabilities.
- What is the exploit attack vector? Can the vulnerability be remotely executed?
Once your vulnerabilities are enriched with exploit intelligence, you can define the risk score and group the vulnerabilities based on these parameters. You can filter key reports to see the high-risk vulnerabilities.
- Minor fixes for this release.
- This integration requires the Vulnerability Response application.