Kaspersky Container Security

Detailed information about detected vulnerabilities

June 17, 2024

ID 275783

To view detailed information about vulnerabilities detected in an image:

In the window with image scan results, select the Vulnerabilities tab.

The list of vulnerabilities detected during image scanning is presented as a table with the following information provided for each vulnerability:

  • The Vulnerability column contains the ID of the vulnerability entry. The identifier is given in the CVE-YYYY-X... format, where:
    • CVE is a prefix that indicates that the vulnerability is included in the database of known vulnerabilities and security defects.
    • YYYY is the year when the vulnerability was reported.
    • X... is the number assigned to the vulnerability by authorized bodies.
  • The Severity column specifies the severity level of a vulnerability based on its risk rating.

    If a vulnerability contains an exploit, an exploit icon (Icon of the vulnerability with an exploit.) is displayed next to the severity level.

  • The Resource column indicates the installed containerized resource in which the vulnerability was detected.

You can accept the risk of the vulnerability by clicking the Accept button in the Risk acceptance column.

To view detailed information about a vulnerability detected in an image:

  1. Do one of the following:
    • In the window with the image scan results, go to the Vulnerabilities tab and click the link with the vulnerability entry ID in the Vulnerabilities column of the table.
    • In the Vulnerabilities section on the dashboard, click the link with the vulnerability record ID.
  2. This opens the sidebar with the following information about the detected vulnerability:
    • Vulnerability entry identifier
    • Description of the vulnerability from the vulnerability database. The description is provided in the language of the vulnerabilities database. For example, descriptions of vulnerabilities from the NVD are displayed in English.
    • The General information tab displays the following:
      • Vulnerability severity level
      • Installed resource in which the vulnerability was detected.
      • Vulnerability severity score based on the CVSS open standard in the NVD, VDB, and RED OS vulnerability databases, as well as the final consolidated vulnerability severity score.

      On this tab, you can accept the risk of the vulnerability by clicking Accept.

      The Accept button is not displayed and risk acceptance is not possible when the sidebar is open on the dashboard.

    • The Scan details tab displays the following:
      • Image in which the vulnerability was detected
      • Operating system that was scanned
      • Date and time when the vulnerability was first detected
      • Date and time of the last time the image was scanned
    • The Workloads tab displays a list of detected workloads and the number of workloads.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.