Software Vulnerabilities
Find vulnerabilities on mapped devices
FAQ
What does this feature do?
Cork will detect software vulnerabilities found on mapped devices with an RMM connected. Note: the RMM must return a software inventory
How frequently are vulnerabilities updated?
Every time compliance events finish processing.
Do these affect my warranties?
Not at this point, however this may change in the future.
What are the different priorities for each vulnerability?
- Critical: Known exploited (KEV), highly exploitable and moderately severe (EPSS), or high severity and somewhat exploitable (CVSS)
- Accelerated: Highly exploitable and low severity, or somewhat exploitable and high severity
- Routine: Doesn't meet other criteria
What is a KEV?
A KEV (Known exploitable vulnerability) is a vulnerability that has been exploited in the wild.
What is a EPSS?
An EPSS (Exploit Prediction Scoring System) is a score between 0 and 1 representing the probability that a software vulnerability will be exploited in the wild within the next 30 days.
What is a CVSS?
A CVSS (Common Vulnerability Scoring System) is a score between 0 to 10 representing the severity of a software vulnerability, with higher scores indicating more critical issues.
What is a CVE?
A CVE (Common Vulnerabilities and Exposures) is a unique identifier for a specific, publicly known cybersecurity vulnerability.
My device doesn't have the software installed that a vulnerability was created for?
The software inventory we retrieve from RMMs return different software names for the same products. As a result we try to normalize these results to figure out what they really are. Please make a ticket and we can look into any potential false positives.
How do I fix a vulnerability?
Often times updating a software to its latest version will resolve any issues. Check the software's vendor for any publications regarding your flagged CVE's for more specific details.