Submit a ticketCall us

Looking to compare latest NPM features with previous versions of NPM?
The NPM new feature summary offers a comparison of new features and improvements offered with this release.

 

 

 

 

Home > Success Center > Network Configuration Manager (NCM) > NCM 7.6 Administrator Guide > Firmware vulnerability data > Vulnerability summary

Vulnerability summary

Table of contents
No headers
Created by Caroline Juszczak, last modified by Anthony.Rinaldi on Oct 03, 2016

Views: 1 Votes: 0 Revisions: 4

This resource provides information on the Common Vulnerabilities and Exposures (CVE) system and enables you to apply a CVE state to one or more managed nodes. Select the desired state, select the nodes to which the CVE applies in this state, and click Submit.

Item

Description

CVSS V2 Base Score

The Common Vulnerability Scoring System (CVSS) uses a metrics to determine the severity of a determined vulnerability. The metrics analyze and assign a value to these aspects related to exploiting a vulnerability:

  • Access required
  • Access complexity
  • Authentication requirement
  • Confidentiality protection
  • Integrity or imperviousness of data to change
  • Availability safeguards
Severity

A CVSS score determines the severity of a vulnerability as:

  • Low (0-3.9)
  • Medium (4.0-6.9)
  • High (7.0-10.0)
URL The source of the CVE information.
Published Date Date the CVE was published.
Summary Explanation of how the CVE puts your device(s), network, and data at risk.
State

The state of the vulnerability with regards to managed nodes:

  • Potential vulnerability
  • Confirmed vulnerability
  • Not applicable
  • Remediation planned
  • Remediated, Waiver

Provides an option to apply selected state to some or all nodes.

 

Last modified
13:39, 3 Oct 2016

Tags

Classifications

Public