Detailed information about detected vulnerabilities
The list of vulnerabilities detected during image scans is presented as a table on the Vulnerabilities tab in the image scan results window. For each vulnerability, the following information is provided:
Vulnerability entry identifier The identifier is given in the CVE-YYYY-X... format, where:
CVE is a prefix that indicates that the vulnerability is included in the database of known vulnerabilities and security defects.
YYYY is the year when the vulnerability was reported.
X... is the number assigned to the vulnerability by authorized bodies.
The vulnerability's severity level based on its risk rating.
If a vulnerability contains an exploit, an exploit icon () is displayed next to the severity level.
Installed containerized resource in which the vulnerability was detected.
Whether a fix for the vulnerability is available from the vendor. The solution shows the version number that has the fix, or indicates that no fix is available.
You can accept the risk of the vulnerability by clicking the Accept button in the Risk acceptance column.
To accept risks, risk management rights are required.
To view detailed information about a detected vulnerability:
Click the link with the vulnerability record ID in one of the following sections:
On the Vulnerabilities tab in the image scan results window.
In the table with the complete list of vulnerabilities in the Investigation → Vulnerabilities section.
This opens the sidebar with the following information about the detected vulnerability:
Vulnerability entry identifier
Description of the vulnerability from the vulnerability database. The description is provided in the language of the vulnerabilities database. For example, descriptions of vulnerabilities from the NVD are displayed in English.
The General information tab displays the following:
The vulnerability's severity level based on its risk rating.
Installed resource in which the vulnerability was detected.
Vulnerability severity score based on the CVSS open standard in the NVD, VDB, and RED OS vulnerability databases, as well as the final consolidated vulnerability severity score.
Russian general-purpose operating system RED OS supports scanning for vulnerabilities that can threaten the functioning of services and workstations.
The Data Security Threats Database (also known as BDU) is a national vulnerability database maintained by the Russian Federal Service for Technical and Export Control (FSTEC).
The National Vulnerability Database is the United States Government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol.
Common Vulnerability Scoring Systemis an open standard for scoring vulnerabilities. CVSS specifies a set of metrics and formulas for scoring vulnerability severity, with values from 0 (minimum) to 10 (maximum). CVSS makes it possible to allocate vulnerability response efforts based on vulnerability severity.
The Artifacts tab displays detailed information on artifacts for images from registries and the runtime or CI/CD objects and indicates how many artifacts there are.
The block for an image from a registry or runtime shows the following information:
Image object type and the name of the image. If autoprofiles were created based on the checksum of this image, an autoprofile icon () appears next to the image name.
Date and time when the vulnerability was first detected in the object.
Timestamp for scanning the object in a CI/CD process.
The Workloads tab displays a list of the pods containing images with the vulnerability and how many of them there are. For each object, the following information is provided:
Name of the cluster containing the pod in whose image or images the vulnerability was detected.
Name of the namespace containing the pod in whose image the vulnerability was detected.