Skip to content

Vulnerability Overview

The Vulnerability Overview provides a consolidated view of known vulnerabilities affecting your external infrastructure. It aggregates data from port scans, technology detection, and CVE matching to show which of your external assets have known vulnerabilities, prioritized for action.

Overview

Vulnerability Overview

This view presents vulnerability data with prioritization indicators, allowing your team to focus remediation efforts on the most dangerous and exploitable issues first.

Prioritization Framework

Vulnerabilities are ranked using a multi-factor prioritization model:

FactorDescriptionWhy It Matters
CVSS ScoreSeverity rating from the National Vulnerability Database (0.0--10.0)Industry-standard measure of vulnerability severity -- Critical (9.0+), High (7.0--8.9), Medium (4.0--6.9), Low (0.1--3.9)
KEV StatusWhether the vulnerability appears in CISA's Known Exploited Vulnerabilities catalogKEV entries represent vulnerabilities that are actively being exploited in the wild -- these demand immediate attention
Exploit AvailabilityWhether public exploit code or proof-of-concept existsPublicly available exploits dramatically lower the barrier for attackers. A high-CVSS vulnerability with a public exploit is far more dangerous than one without
Asset CriticalityThe importance of the affected asset to your organizationA medium-severity vulnerability on a payment processing server is more urgent than a critical vulnerability on a development test server

How Vulnerabilities Are Detected

ShadowMap identifies vulnerabilities through a multi-step process:

  1. Port scanning discovers open services on your external IP addresses
  2. Technology fingerprinting identifies the software and versions running on each service
  3. CVE matching correlates detected software versions against the National Vulnerability Database
  4. Enrichment adds KEV status, exploit availability, and EPSS probability scores

Vulnerability vs. CVE Intelligence

Vulnerability Overview (this page)CVEs (Threat Intelligence)
ScopeVulnerabilities confirmed on YOUR assetsGlobal CVE database across all software
Data sourceShadowMap scans of your infrastructureNVD, MITRE, and threat intelligence feeds
Use caseRemediation prioritization for your specific environmentResearch and awareness of vulnerabilities in technologies you use
  1. Start with KEV-flagged vulnerabilities -- these are actively exploited and represent the highest immediate risk
  2. Address Critical CVSS scores next, especially those with available public exploits
  3. Consider asset criticality -- prioritize internet-facing production servers over internal test systems
  4. Cross-reference with IP Addresses to understand which infrastructure is affected
  5. Track remediation through the Alerts module to ensure vulnerabilities are patched within SLA targets
  6. Configure vulnerability scan profiles in Settings to control scan behavior and rate limits

ShadowMap by Security Brigade