Vulnerability Scans

(OBJ 4.9)

Vulnerability Scan Report

False Positives

Analysis of Vulnerabilities

Components of a Vulnerability Scan Report

Example of a Vulnerability Scan Report

Pasted image 20250724180347.png|600

  1. Apply Windows Update
  2. To secure systems, update the vulnerable security patch if RDP is essential for remote desktop support
    • Authenticated attacker
      • Insider threat
    • Unauthenticated attacker
      • Anyone will be able to connect using RDP
    • Score is lower because of what it is impacting
      • RDP impacts individual workstations, while Exchange servers affect the entire organization's email services
  3. Apache remote code execution, install the latest version of Apache Druid to address this vulnerability
    • When updating isn't an option, alternative compensating controls are necessary for addressing vulnerabilities

Pasted image 20250724181218.png|600
4. Update the Spring Framework version
5. Only affects very few applications using Log4j. Update to Log4j version 2.15.0 or higher.

Review the vulnerability scan report thoroughly beyond automated rankings based on CVE posture or CVSS scores