Security Vision Company announces the release of a new version of Vulnerability Scanner, which significantly expands the capabilities for vulnerability detection and analysis. The update enhances integration with National Computer Incident Response and Coordination Center (NCIRCC), adds new knowledge bases, expands web scanning functionality, and further optimizes analytics processes.
Interaction with regulators
Particular attention is paid to cooperation with key Russian regulators. NCIRCC bulletins are now automatically uploaded to the system and enrich vulnerability cards with additional information. For the FSTEC methodology, the asset vulnerability criticality level has been calculated, and recommendations for Windows updates (Knowledge Base updates) that have been tested by the FSTEC have been added. All this helps to prioritize tasks more precisely and act in accordance with the requirements of the regulator.
Expanded knowledge base and consideration of real threats
The Vulnerability Scanner knowledge base has become even richer. Additionally, information from the CISA KEV catalog of actively exploited vulnerabilities is considered, and exploitation probability estimates from the EPSS system are also used. This approach allows you to take into account the most pressing threats and predict real risks.
Network equipment audit
The new version has expanded the capabilities of network equipment auditing. Scanning, obtaining data on vulnerabilities and ways to fix them for devices from the largest vendors: Cisco, Huawei, Juniper, Check Point, Fortinet, etc. has been implemented. Data acquisition is available via SSH and SNMP protocols.
CVSS 4.0 support
Added support for the new CVSS 4.0 metric. Thanks to it, the system more accurately and in detail assesses the criticality of vulnerabilities, considering modern aspects of cyber threats. This helps you make informed decisions about fix prioritization.
Exception management
The exception management functionality has been expanded: vulnerabilities and products can now be excluded from scan results for one specific host, as well as for all at once. In subsequent checks, the excluded elements will not be taken into account.
Scan Control
Now, in the product, you can not only plan the "windows" for scanning in advance, but also flexibly manage the process itself. In addition to the delayed launch, the ability to pause or stop scanning has been added.
BlackBox improvements and Web application verification
The functionality of BlackBox has also expanded significantly. New web application security checks have been added, and the management interface allows you to implement more custom scanning scenarios. Verification of weak credentials has now been moved to a separate Bruteforce mode, which is complemented by support for password selection using remote management protocols (RDP, Radmin, NetBIOS) and databases (Sybase, PostgreSQL).
Support for legacy systems
The collection of information about software on legacy systems, such as CentOS 6, Windows Server 2008R2 and 2012R2, etc., has been improved.
Analytics and reporting
New tools have been added for analytics and reporting. Differential reports allow you to compare scan results over time and see the dynamics of corrections. The scan log for each asset keeps a history of changes and helps you quickly figure out what measures have already been taken.
Resume
The new version of Vulnerability Scanner helps information security teams work faster, see the full picture of risks, and make decisions based on up-to-date and reliable information.