Tenable Vulnerability Management
editTenable Vulnerability Management
editVersion |
3.5.0 (View all) |
Compatible Kibana version(s) |
8.13.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
Overview
editThe Tenable Vulnerability Management integration allows users to monitor asset, plugin, scan and vulnerability activity. It provides the industry’s most comprehensive vulnerability coverage with the ability to predict which security issues to remediate first. Tenable Vulnerability Management is the user’s complete end-to-end vulnerability management solution.
Use the Tenable Vulnerability Management integration to collects and parses data from the REST APIs. Then visualize that data in Kibana.
Data streams
editThe Tenable Vulnerability Management integration collects logs for four types of events: Asset, Plugin, Scan, and Vulnerability.
Asset is used to get details related to assets that belong to the user’s organization. See more details in the API documentation here.
Plugin is used to get detailed plugin information. See more details in the API documentation here.
Vulnerability is used to retrieve all vulnerabilities on each asset, including the vulnerability state. See more details in the API documentation here.
Scan is used to retrieve details about existing scans, including scan statuses, assigned targets, and more. See more details in the API documentation here.
Compatibility
editThis module has been tested against Tenable Vulnerability Management release
December 6, 2022.
Requirements
edit- Elastic Agent must be installed.
- You can install only one Elastic Agent per host.
- Elastic Agent is required to stream data through the REST API and ship the data to Elastic, where the events will then be processed via the integration’s ingest pipelines.
Installing and managing an Elastic Agent:
editYou have a few options for installing and managing an Elastic Agent:
Install a Fleet-managed Elastic Agent (recommended):
editWith this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
Install Elastic Agent in standalone mode (advanced users):
editWith this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
Install Elastic Agent in a containerized environment:
editYou can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
The minimum kibana.version required is 8.12.0.
NOTE:
- In this integration, export and plugin endpoints of vulnerability management are used to fetch data.
- The default value is the recommended value for a batch size by Tenable. Using a smaller batch size can improve performance. A very large value might not work as intended depending on the API and instance limitations.
- If any long-running export jobs are stuck in the "PROCESSING" state and reach the user-provided timeout, the export job will be terminated, allowing for the initiation of a new export job after the specified interval.
Setup
editTo collect data from the Tenable Vulnerability Management REST APIs, follow the below steps:
edit- Create a valid user account with appropriate permissions on Tenable Vulnerability Management.
- Generate the API keys for the account to access all Tenable Vulnerability Management APIs.
NOTE:
- For the Tenable Vulnerability Management asset and vulnerability API, ADMINISTRATOR [64] and Can View access control is required in created user’s access key and secret key.
- For the Tenable Vulnerability Management plugin, BASIC [16] user permissions are required in created user’s access key and secret key.
- For more details related to permissions, refer to the link here.
Enabling the integration in Elastic:
edit- In Kibana go to Management > Integrations
- In "Search for integrations" search bar, type Tenable Vulnerability Management.
- Click on the "Tenable Vulnerability Management" integration from the search results.
- Click on the "Add Tenable Vulnerability Management" button to add the integration.
- Add all the required integration configuration parameters according to the enabled input type.
- Click on "Save and Continue" to save the integration.
Logs reference
editasset
editThis is the asset
dataset.
Example
An example event for asset
looks as following:
{ "@timestamp": "2018-12-31T22:27:58.599Z", "agent": { "ephemeral_id": "f945f2c2-fbaf-4b93-b6ca-7d51e6a0706d", "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "cloud": { "availability_zone": "12", "instance": { "id": "12" }, "project": { "id": "12" } }, "data_stream": { "dataset": "tenable_io.asset", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "snapshot": false, "version": "8.12.0" }, "event": { "agent_id_status": "verified", "category": [ "host" ], "dataset": "tenable_io.asset", "ingested": "2024-04-02T09:13:00Z", "kind": "state", "original": "{\"acr_score\":\"3\",\"agent_names\":[],\"agent_uuid\":\"22\",\"aws_availability_zone\":null,\"aws_ec2_instance_ami_id\":\"12\",\"aws_ec2_instance_group_name\":null,\"aws_ec2_instance_id\":\"12\",\"aws_ec2_instance_state_name\":null,\"aws_ec2_instance_type\":null,\"aws_ec2_name\":null,\"aws_ec2_product_code\":null,\"aws_owner_id\":\"44\",\"aws_region\":null,\"aws_subnet_id\":null,\"aws_vpc_id\":null,\"azure_resource_id\":\"12\",\"azure_vm_id\":\"12\",\"bigfix_asset_id\":null,\"bios_uuid\":\"33\",\"created_at\":\"2017-12-31T20:40:44.535Z\",\"deleted_at\":\"2017-12-31T20:40:44.535Z\",\"deleted_by\":\"user\",\"exposure_score\":\"721\",\"first_scan_time\":\"2017-12-31T20:40:23.447Z\",\"first_seen\":\"2017-12-31T20:40:23.447Z\",\"fqdns\":[\"example.com\"],\"gcp_instance_id\":\"12\",\"gcp_project_id\":\"12\",\"gcp_zone\":\"12\",\"has_agent\":false,\"has_plugin_results\":true,\"hostnames\":[],\"id\":\"95c2725c-7298-4a44-8a1d-63131ca3f01f\",\"installed_software\":[\"cpe:/a:test:xyz:12.8\",\"cpe:/a:test:abc:7.7.3\",\"cpe:/a:test:pqr:6.9\",\"cpe:/a:test:xyz\"],\"ipv4s\":[\"89.160.20.112\"],\"ipv6s\":[],\"last_authenticated_scan_date\":\"2017-12-31T20:40:44.535Z\",\"last_licensed_scan_date\":\"2018-12-31T22:27:52.869Z\",\"last_scan_id\":\"00283024-afee-44ea-b467-db5a6ed9fd50ab8f7ecb158c480e\",\"last_scan_time\":\"2018-03-31T22:27:52.869Z\",\"last_schedule_id\":\"72284901-7c68-42b2-a0c4-c1e75568849df60557ee0e264228\",\"last_seen\":\"2018-12-31T22:27:52.869Z\",\"mac_addresses\":[],\"manufacturer_tpm_ids\":[],\"mcafee_epo_agent_guid\":null,\"mcafee_epo_guid\":null,\"netbios_names\":[],\"network_interfaces\":[{\"fqdns\":[\"example.com\"],\"ipv4s\":[\"89.160.20.112\",\"81.2.69.144\"],\"ipv6s\":[\"2a02:cf40::\"],\"mac_addresses\":[\"00-00-5E-00-53-00\",\"00-00-5E-00-53-FF\"],\"name\":\"test.0.1234\"}],\"operating_systems\":[],\"qualys_asset_ids\":[],\"qualys_host_ids\":[],\"servicenow_sysid\":null,\"sources\":[{\"first_seen\":\"2017-12-31T20:40:23.447Z\",\"last_seen\":\"2018-12-31T22:27:52.869Z\",\"name\":\"TEST_SCAN\"}],\"ssh_fingerprints\":[],\"symantec_ep_hardware_keys\":[],\"system_types\":[],\"tags\":[{\"added_at\":\"2018-12-31T14:53:13.817Z\",\"added_by\":\"ac2e7ef6-fac9-47bf-9170-617331322885\",\"key\":\"Geographic Area\",\"uuid\":\"47e7f5f6-1013-4401-a705-479bfadc7826\",\"value\":\"APAC\"}],\"terminated_at\":\"2017-12-31T20:40:44.535Z\",\"terminated_by\":\"user\",\"updated_at\":\"2018-12-31T22:27:58.599Z\"}", "type": [ "info" ] }, "host": { "domain": [ "example.com" ], "id": "95c2725c-7298-4a44-8a1d-63131ca3f01f", "ip": [ "89.160.20.112" ], "mac": [ "00-00-5E-00-53-00", "00-00-5E-00-53-FF" ] }, "input": { "type": "cel" }, "related": { "hosts": [ "example.com" ], "ip": [ "89.160.20.112", "81.2.69.144", "2a02:cf40::" ] }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "tenable_io-asset" ], "tenable_io": { "asset": { "acr_score": 3, "agent_uuid": "22", "aws": { "ec2_instance": { "ami_id": "12", "id": "12" }, "owner_id": "44" }, "azure": { "resource_id": "12", "vm_id": "12" }, "bios_uuid": "33", "created_at": "2017-12-31T20:40:44.535Z", "deleted_at": "2017-12-31T20:40:44.535Z", "deleted_by": "user", "exposure_score": 721, "first_scan_time": "2017-12-31T20:40:23.447Z", "first_seen": "2017-12-31T20:40:23.447Z", "fqdns": [ "example.com" ], "gcp": { "instance_id": "12", "project_id": "12", "zone": "12" }, "has_agent": false, "has_plugin_results": true, "id": "95c2725c-7298-4a44-8a1d-63131ca3f01f", "installed_software": [ "cpe:/a:test:xyz:12.8", "cpe:/a:test:abc:7.7.3", "cpe:/a:test:pqr:6.9", "cpe:/a:test:xyz" ], "ipv4s": [ "89.160.20.112" ], "last_authenticated_scan_date": "2017-12-31T20:40:44.535Z", "last_licensed_scan_date": "2018-12-31T22:27:52.869Z", "last_scan_id": "00283024-afee-44ea-b467-db5a6ed9fd50ab8f7ecb158c480e", "last_scan_time": "2018-03-31T22:27:52.869Z", "last_schedule_id": "72284901-7c68-42b2-a0c4-c1e75568849df60557ee0e264228", "last_seen": "2018-12-31T22:27:52.869Z", "network_interfaces": [ { "fqdns": [ "example.com" ], "ipv4s": [ "89.160.20.112", "81.2.69.144" ], "ipv6s": [ "2a02:cf40::" ], "mac_addresses": [ "00-00-5E-00-53-00", "00-00-5E-00-53-FF" ], "name": "test.0.1234" } ], "sources": [ { "first_seen": "2017-12-31T20:40:23.447Z", "last_seen": "2018-12-31T22:27:52.869Z", "name": "TEST_SCAN" } ], "tags": [ { "added_at": "2018-12-31T14:53:13.817Z", "added_by": "ac2e7ef6-fac9-47bf-9170-617331322885", "key": "Geographic Area", "uuid": "47e7f5f6-1013-4401-a705-479bfadc7826", "value": "APAC" } ], "terminated_at": "2017-12-31T20:40:44.535Z", "terminated_by": "user", "updated_at": "2018-12-31T22:27:58.599Z" } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
tenable_io.asset.acr_score |
The Asset Criticality Rating (ACR) for the asset. With Lumin, Tenable assigns an ACR to each asset on your network to represent the asset’s relative risk as an integer from 1 to 10. |
long |
tenable_io.asset.agent_names |
The names of any Nessus agents that scanned and identified the asset. |
keyword |
tenable_io.asset.agent_uuid |
The unique identifier of the Nessus agent that identified the asset. |
keyword |
tenable_io.asset.aws.availability_zone |
The availability zone where Amazon Web Services hosts the virtual machine instance, for example, |
keyword |
tenable_io.asset.aws.ec2_instance.ami_id |
The unique identifier of the Linux AMI image in Amazon Elastic Compute Cloud (Amazon EC2). For more information, see the Amazon Elastic Compute Cloud Documentation. |
keyword |
tenable_io.asset.aws.ec2_instance.group_name |
The virtual machine instance’s group in AWS. |
keyword |
tenable_io.asset.aws.ec2_instance.id |
The unique identifier of the Linux instance in Amazon EC2. For more information, see the Amazon Elastic Compute Cloud Documentation. |
keyword |
tenable_io.asset.aws.ec2_instance.state_name |
The state of the virtual machine instance in AWS at the time of the scan. |
keyword |
tenable_io.asset.aws.ec2_instance.type |
The type of instance in AWS EC2. |
keyword |
tenable_io.asset.aws.ec2_name |
The name of the virtual machine instance in AWS EC2. |
keyword |
tenable_io.asset.aws.ec2_product_code |
The product code associated with the AMI used to launch the virtual machine instance in AWS EC2. |
keyword |
tenable_io.asset.aws.owner_id |
he canonical user identifier for the AWS account associated with the virtual machine instance. For example, 79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be |
keyword |
tenable_io.asset.aws.region |
The region where AWS hosts the virtual machine instance, for example, us-east-1. For more information, see "Regions and Availability Zones" in the AWS documentation. |
keyword |
tenable_io.asset.aws.subnet_id |
The unique identifier of the AWS subnet where the virtual machine instance was running at the time of the scan. |
keyword |
tenable_io.asset.aws.vpc_id |
The unique identifier for the virtual public cloud that hosts the AWS virtual machine instance. For more information, see the Amazon Virtual Private Cloud User Guide. |
keyword |
tenable_io.asset.azure.resource_id |
The unique identifier of the resource in the Azure Resource Manager. For more information, see the Azure Resource Manager Documentation. |
keyword |
tenable_io.asset.azure.vm_id |
The unique identifier of the Microsoft Azure virtual machine instance. For more information, see "Accessing and Using Azure VM Unique ID" in the Microsoft Azure documentation. |
keyword |
tenable_io.asset.bigfix_asset_id |
The unique identifiers of the asset in HCL BigFix. |
keyword |
tenable_io.asset.bios_uuid |
The BIOS UUID of the asset. |
keyword |
tenable_io.asset.created_at |
The time and date when Tenable Vulnerability Management created the asset record. |
date |
tenable_io.asset.deleted_at |
The time and date when a user deleted the asset record. When a user deletes an asset record, Tenable Vulnerability Management retains the record until the asset ages out of the license count. |
date |
tenable_io.asset.deleted_by |
The user who deleted the asset record. |
keyword |
tenable_io.asset.exposure_score |
The Asset Exposure Score (AES) for the asset. |
long |
tenable_io.asset.first_scan_time |
The time and date of the first scan run against the asset. |
date |
tenable_io.asset.first_seen |
The time and date when a scan first identified the asset. |
date |
tenable_io.asset.fqdns |
The fully-qualified domain names that scans have associated with the asset record. |
keyword |
tenable_io.asset.gcp.instance_id |
The zone where the virtual machine instance runs in GCP. For more information, see "Regions and Zones" in the GCP documentation. |
keyword |
tenable_io.asset.gcp.project_id |
The unique identifier of the virtual machine instance in Google Cloud Platform (GCP). |
keyword |
tenable_io.asset.gcp.zone |
The customized name of the project to which the virtual machine instance belongs in GCP. |
keyword |
tenable_io.asset.has_agent |
Specifies whether a Nessus agent scan identified the asset. |
boolean |
tenable_io.asset.has_plugin_results |
Specifies whether the asset has plugin results associated with it. |
boolean |
tenable_io.asset.hostnames |
The hostnames that scans have associated with the asset record. |
keyword |
tenable_io.asset.id |
The UUID of the asset in Tenable Vulnerability Management. Use this value as the unique key for the asset. |
keyword |
tenable_io.asset.installed_software |
A list of Common Platform Enumeration (CPE) values that represent software applications a scan identified as present on an asset. This attribute supports the CPE 2.2 format. |
keyword |
tenable_io.asset.ipv4s |
The IPv4 addresses that scans have associated with the asset record. |
ip |
tenable_io.asset.ipv6s |
The IPv6 addresses that scans have associated with the asset record. |
ip |
tenable_io.asset.last_authenticated_scan_date |
The time and date of the last credentialed scan run on the asset. |
date |
tenable_io.asset.last_licensed_scan_date |
The time and date of the last scan that identified the asset as licensed. Tenable Vulnerability Management categorizes an asset as licensed if a scan of that asset has returned results from a non-discovery plugin within the last 90 days. |
date |
tenable_io.asset.last_scan_id |
The UUID of the scan configuration used during the last scan of the asset. |
keyword |
tenable_io.asset.last_scan_time |
The time and date of the last scan run against the asset. |
date |
tenable_io.asset.last_schedule_id |
The schedule_uuid for the last scan of the asset. |
keyword |
tenable_io.asset.last_seen |
The time and date of the scan that most recently identified the asset. |
date |
tenable_io.asset.mac_addresses |
The MAC addresses that scans have associated with the asset record. |
keyword |
tenable_io.asset.manufacturer_tpm_ids |
The manufacturer’s unique identifiers of the Trusted Platform Module (TPM) associated with the asset. |
keyword |
tenable_io.asset.mcafee_epo.agent_guid |
The unique identifier of the McAfee ePO agent that identified the asset. For more information, see the McAfee documentation. |
keyword |
tenable_io.asset.mcafee_epo.guid |
The unique identifier of the asset in McAfee ePolicy Orchestrator (ePO). For more information, see the McAfee documentation. |
keyword |
tenable_io.asset.netbios_names |
The NetBIOS names that scans have associated with the asset record. |
keyword |
tenable_io.asset.network.id |
The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000 |
keyword |
tenable_io.asset.network.name |
The ID of the network object associated with scanners that identified the asset. The default network name is Default. All other network names are user-defined |
keyword |
tenable_io.asset.network_interfaces.aliased |
boolean |
|
tenable_io.asset.network_interfaces.fqdns |
One or more FQDN belonging to the interface. |
keyword |
tenable_io.asset.network_interfaces.ipv4s |
One or more IPv4 addresses belonging to the interface. |
ip |
tenable_io.asset.network_interfaces.ipv6s |
One or more IPv6 addresses belonging to the interface. |
ip |
tenable_io.asset.network_interfaces.mac_addresses |
The MAC addresses of the interface. |
keyword |
tenable_io.asset.network_interfaces.name |
The name of the interface. |
keyword |
tenable_io.asset.network_interfaces.virtual |
keyword |
|
tenable_io.asset.operating_systems |
The operating systems that scans have associated with the asset record. |
keyword |
tenable_io.asset.qualys.asset_ids |
The Asset ID of the asset in Qualys. |
keyword |
tenable_io.asset.qualys.host_ids |
The Host ID of the asset in Qualys. |
keyword |
tenable_io.asset.servicenow_sysid |
The unique record identifier of the asset in ServiceNow. |
keyword |
tenable_io.asset.sources.first_seen |
The ISO timestamp when the source first reported the asset. |
date |
tenable_io.asset.sources.last_seen |
The ISO timestamp when the source last reported the asset. |
date |
tenable_io.asset.sources.name |
The name of the entity that reported the asset details. Sources can include sensors, connectors, and API imports. Source names can be customized by your organization. |
keyword |
tenable_io.asset.ssh_fingerprints |
The SSH key fingerprints that scans have associated with the asset record. |
keyword |
tenable_io.asset.symantec_ep_hardware_keys |
The hardware keys for the asset in Symantec Endpoint Protection. |
keyword |
tenable_io.asset.system_types |
The system types as reported by Plugin ID 54615. Possible values include router, general-purpose, scan-host, and embedded. |
keyword |
tenable_io.asset.tags.added_at |
The ISO timestamp when the tag was assigned to the asset. |
date |
tenable_io.asset.tags.added_by |
The UUID of the user who assigned the tag to the asset. |
keyword |
tenable_io.asset.tags.key |
The tag category (the first half of the category:value pair). |
keyword |
tenable_io.asset.tags.uuid |
The UUID of the tag. |
keyword |
tenable_io.asset.tags.value |
The tag value (the second half of the category:value pair). |
keyword |
tenable_io.asset.terminated_at |
The time and date when a user terminated the Amazon Web Service (AWS) virtual machine instance of the asset. |
date |
tenable_io.asset.terminated_by |
The user who terminated the AWS instance of the asset. |
keyword |
tenable_io.asset.updated_at |
The time and date when the asset record was last updated. |
date |
plugin
editThis is the plugin
dataset.
Example
An example event for plugin
looks as following:
{ "@timestamp": "2018-07-19T00:00:00.000Z", "agent": { "ephemeral_id": "f945f2c2-fbaf-4b93-b6ca-7d51e6a0706d", "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "tenable_io.plugin", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "snapshot": false, "version": "8.12.0" }, "event": { "agent_id_status": "verified", "dataset": "tenable_io.plugin", "ingested": "2024-04-02T09:13:52Z", "kind": "state", "original": "{\"attributes\":{\"cpe\":[\"p-cpe:/a:fedoraproject:fedora:kernel-source\",\"cpe:/o:fedoraproject:fedora_core:1\",\"p-cpe:/a:fedoraproject:fedora:kernel-BOOT\",\"p-cpe:/a:fedoraproject:fedora:kernel-debuginfo\",\"p-cpe:/a:fedoraproject:fedora:kernel\",\"p-cpe:/a:fedoraproject:fedora:kernel-doc\",\"p-cpe:/a:fedoraproject:fedora:kernel-smp\"],\"cve\":[\"CVE-2003-0984\"],\"cvss3_base_score\":0,\"cvss3_temporal_score\":0,\"cvss_base_score\":4.6,\"cvss_temporal_score\":0,\"cvss_vector\":{\"AccessComplexity\":\"Low\",\"AccessVector\":\"Local-access\",\"Authentication\":\"None required\",\"Availability-Impact\":\"Partial\",\"Confidentiality-Impact\":\"Partial\",\"Integrity-Impact\":\"Partial\",\"raw\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\"},\"default_account\":false,\"description\":\"Various RTC drivers had the potential to leak...\",\"exploit_available\":false,\"exploit_framework_canvas\":false,\"exploit_framework_core\":false,\"exploit_framework_d2_elliot\":false,\"exploit_framework_exploithub\":false,\"exploit_framework_metasploit\":false,\"exploited_by_malware\":false,\"exploited_by_nessus\":false,\"has_patch\":true,\"in_the_news\":false,\"malware\":false,\"patch_publication_date\":\"2004-01-07T00:00:00Z\",\"plugin_modification_date\":\"2018-07-19T00:00:00Z\",\"plugin_publication_date\":\"2004-07-23T00:00:00Z\",\"plugin_type\":\"local\",\"plugin_version\":\"1.17\",\"risk_factor\":\"Medium\",\"see_also\":[\"http://example.com/u?07bc9e7f\"],\"solution\":\"Update the affected packages.\",\"synopsis\":\"The remote Fedora Core host is missing a security update.\",\"unsupported_by_vendor\":false,\"vpr\":{\"drivers\":{\"age_of_vuln\":{\"lower_bound\":366,\"upper_bound\":730},\"cvss3_impact_score\":5.9,\"cvss_impact_score_predicted\":false,\"exploit_code_maturity\":\"UNPROVEN\",\"product_coverage\":\"LOW\",\"threat_intensity_last28\":\"VERY_LOW\",\"threat_recency\":{\"lower_bound\":366,\"upper_bound\":730},\"threat_sources_last28\":[\"No recorded events\"]},\"score\":5.5,\"updated\":\"2018-07-19T00:00:00Z\"},\"xref\":[\"FEDORA:2003-047\"],\"xrefs\":[{\"id\":\"2003-047\",\"type\":\"FEDORA\"}]},\"id\":13670,\"name\":\"Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)\"}", "type": [ "info" ] }, "input": { "type": "cel" }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "tenable_io-plugin" ], "tenable_io": { "plugin": { "attributes": { "cpe": [ "p-cpe:/a:fedoraproject:fedora:kernel-source", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:kernel-BOOT", "p-cpe:/a:fedoraproject:fedora:kernel-debuginfo", "p-cpe:/a:fedoraproject:fedora:kernel", "p-cpe:/a:fedoraproject:fedora:kernel-doc", "p-cpe:/a:fedoraproject:fedora:kernel-smp" ], "cve": [ "CVE-2003-0984" ], "cvss": { "base_score": 4.6, "temporal": { "score": 0 }, "vector": { "access": { "complexity": "Low", "vector": "Local-access" }, "authentication": "None required", "availability_impact": "Partial", "confidentiality_impact": "Partial", "integrity_impact": "Partial", "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } }, "cvss3": { "base_score": 0, "temporal": { "score": 0 } }, "default_account": false, "description": "Various RTC drivers had the potential to leak...", "exploit_available": false, "exploit_framework": { "canvas": false, "core": false, "d2_elliot": false, "hub": false, "metasploit": false }, "exploited_by": { "malware": false, "nessus": false }, "has_patch": true, "in_the_news": false, "malware": false, "patch_publication_date": "2004-01-07T00:00:00.000Z", "plugin": { "modification_date": "2018-07-19T00:00:00.000Z", "publication_date": "2004-07-23T00:00:00.000Z", "type": "local", "version": "1.17" }, "risk_factor": "Medium", "see_also": [ "http://example.com/u?07bc9e7f" ], "solution": "Update the affected packages.", "synopsis": "The remote Fedora Core host is missing a security update.", "unsupported_by_vendor": false, "vpr": { "drivers": { "age_of_vuln": { "lower_bound": 366, "upper_bound": 730 }, "cvss3_impact_score": 5.9, "cvss_impact_score_predicted": false, "exploit_code_maturity": "UNPROVEN", "product_coverage": "LOW", "threat_intensity_last28": "VERY_LOW", "threat_recency": { "lower_bound": 366, "upper_bound": 730 }, "threat_sources_last28": [ "No recorded events" ] }, "score": 5.5, "updated": "2018-07-19T00:00:00.000Z" }, "xref": [ "FEDORA:2003-047" ], "xrefs": [ { "id": "2003-047", "type": "FEDORA" } ] }, "id": "13670", "name": "Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)" } }, "vulnerability": { "id": [ "CVE-2003-0984" ], "reference": [ "http://example.com/u?07bc9e7f" ], "scanner": { "vendor": "Tenable" }, "score": { "base": 0, "temporal": 0 } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
tenable_io.plugin.attributes.always_run |
boolean |
|
tenable_io.plugin.attributes.bid |
long |
|
tenable_io.plugin.attributes.compliance |
boolean |
|
tenable_io.plugin.attributes.cpe |
A list of plugin target systems identified by Common Platform Enumeration (CPE). |
keyword |
tenable_io.plugin.attributes.cve |
A list of Common Vulnerabilities and Exposures (CVE) IDs for vulnerabilities associated with the plugin. |
keyword |
tenable_io.plugin.attributes.cvss.base_score |
The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). |
double |
tenable_io.plugin.attributes.cvss.temporal.score |
The raw CVSSv2 temporal metrics for the vulnerability. |
double |
tenable_io.plugin.attributes.cvss.temporal.vector.exploitability |
keyword |
|
tenable_io.plugin.attributes.cvss.temporal.vector.raw |
keyword |
|
tenable_io.plugin.attributes.cvss.temporal.vector.remediation_level |
keyword |
|
tenable_io.plugin.attributes.cvss.temporal.vector.report_confidence |
keyword |
|
tenable_io.plugin.attributes.cvss.vector.access.complexity |
This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system. The possible values for this metric are High (H), Medium (M), and Low (L). |
keyword |
tenable_io.plugin.attributes.cvss.vector.access.vector |
This metric reflects how the vulnerability is exploited. The possible values for this metric are Local (L), Adjacent Network (A), and Network (N). |
keyword |
tenable_io.plugin.attributes.cvss.vector.authentication |
This metric measures the number of times an attacker must authenticate to a target in order to exploit a vulnerability. The possible values for this metric are Multiple (M), Single (S) and None (N). |
keyword |
tenable_io.plugin.attributes.cvss.vector.availability_impact |
This metric measures the impact to availability of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss.vector.confidentiality_impact |
This metric measures the impact on confidentiality of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss.vector.integrity_impact |
This metric measures the impact to integrity of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss.vector.raw |
keyword |
|
tenable_io.plugin.attributes.cvss3.base_score |
The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). |
double |
tenable_io.plugin.attributes.cvss3.temporal.score |
The CVSSv3 temporal metrics for the vulnerability. |
double |
tenable_io.plugin.attributes.cvss3.temporal.vector.exploit_code_maturity |
keyword |
|
tenable_io.plugin.attributes.cvss3.temporal.vector.raw |
keyword |
|
tenable_io.plugin.attributes.cvss3.temporal.vector.remediation_level |
keyword |
|
tenable_io.plugin.attributes.cvss3.temporal.vector.report_confidence |
keyword |
|
tenable_io.plugin.attributes.cvss3.vector.attack.complexity |
This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system. The possible values for this metric are High (H), Medium (M), and Low (L). |
keyword |
tenable_io.plugin.attributes.cvss3.vector.attack.vector |
This metric reflects how the vulnerability is exploited. The possible values for this metric are Local (L), Adjacent Network (A), and Network (N). |
keyword |
tenable_io.plugin.attributes.cvss3.vector.availability_impact |
This metric measures the impact to availability of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss3.vector.confidentiality_impact |
This metric measures the impact on confidentiality of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss3.vector.integrity_impact |
This metric measures the impact to integrity of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete ©. |
keyword |
tenable_io.plugin.attributes.cvss3.vector.privileges_required |
keyword |
|
tenable_io.plugin.attributes.cvss3.vector.raw |
keyword |
|
tenable_io.plugin.attributes.cvss3.vector.scope |
keyword |
|
tenable_io.plugin.attributes.cvss3.vector.user_interaction |
keyword |
|
tenable_io.plugin.attributes.default_account |
Indicates whether the plugin checks for default accounts requiring the use of credentials other than the credentials provided in the scan policy. |
boolean |
tenable_io.plugin.attributes.description |
The extended description of the plugin. |
keyword |
tenable_io.plugin.attributes.exploit_available |
Indicates whether a known public exploit exists for the vulnerability. |
boolean |
tenable_io.plugin.attributes.exploit_framework.canvas |
Indicates whether an exploit exists in the Immunity CANVAS framework. |
boolean |
tenable_io.plugin.attributes.exploit_framework.core |
Indicates whether an exploit exists in the CORE Impact framework. |
boolean |
tenable_io.plugin.attributes.exploit_framework.d2_elliot |
Indicates an exploit exists in the D2 Elliot Web Exploitation framework. |
boolean |
tenable_io.plugin.attributes.exploit_framework.hub |
Indicates whether an exploit exists in the ExploitHub framework. |
boolean |
tenable_io.plugin.attributes.exploit_framework.metasploit |
Indicates whether an exploit exists in the Metasploit framework. |
boolean |
tenable_io.plugin.attributes.exploited_by.malware |
Indicates whether the vulnerability discovered by this plugin is known to be exploited by malware. |
boolean |
tenable_io.plugin.attributes.exploited_by.nessus |
Indicates whether Nessus exploited the vulnerability during the process of identification. |
boolean |
tenable_io.plugin.attributes.has_patch |
Indicates whether the vendor has published a patch for the vulnerability. This attribute is true if there is a published patch for the vulnerability (that is, the patch_publication_date attribute contains data) and false if there is no published patch or a patch is not relevant to remediating the vulnerability (that is, patch_publication_date does not contain data). |
boolean |
tenable_io.plugin.attributes.in_the_news |
Indicates whether this plugin has received media attention (for example, ShellShock, Meltdown). |
boolean |
tenable_io.plugin.attributes.intel_type |
keyword |
|
tenable_io.plugin.attributes.malware |
Indicates whether the plugin targets potentially malicious files or processes. |
boolean |
tenable_io.plugin.attributes.patch_publication_date |
The date when the vendor published a patch for the vulnerability. |
date |
tenable_io.plugin.attributes.plugin.modification_date |
The date when Tenable last updated the plugin. |
date |
tenable_io.plugin.attributes.plugin.publication_date |
The date when Tenable originally published the plugin. |
date |
tenable_io.plugin.attributes.plugin.type |
Plugin type, for example, local, remote, or combined. |
keyword |
tenable_io.plugin.attributes.plugin.version |
The version of the plugin. |
version |
tenable_io.plugin.attributes.risk_factor |
The risk factor associated with the plugin. Possible values are: Low (The vulnerability has a CVSS score between 0.1 and 3.9), Medium (The vulnerability has a CVSS score between 4.0 and 6.9), High (The vulnerability has a CVSS score between 7.0 and 9.9), or Critical (The vulnerability has a CVSS score of 10.0). |
keyword |
tenable_io.plugin.attributes.see_also |
Links to external websites that contain helpful information about the vulnerability. |
keyword |
tenable_io.plugin.attributes.solution |
Remediation information for the vulnerability. |
keyword |
tenable_io.plugin.attributes.synopsis |
A brief summary of the vulnerability or vulnerabilities associated with the plugin. |
keyword |
tenable_io.plugin.attributes.unsupported_by_vendor |
Indicates whether the software found by this plugin is unsupported by the software’s vendor (for example, Windows 95 or Firefox 3). |
boolean |
tenable_io.plugin.attributes.vpr.drivers.age_of_vuln.lower_bound |
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 730 days), this value is "731". |
long |
tenable_io.plugin.attributes.vpr.drivers.age_of_vuln.upper_bound |
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category. |
long |
tenable_io.plugin.attributes.vpr.drivers.cvss3_impact_score |
The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did not provide a score, Tenable Vulnerability Management displays a Tenable-predicted score. |
double |
tenable_io.plugin.attributes.vpr.drivers.cvss_impact_score_predicted |
A value specifying whether Tenable predicted the CVSSv3 impact score for the vulnerability because NVD did not provide one (true) or used the NVD-provided CVSSv3 impact score (false) when calculating the VPR. |
boolean |
tenable_io.plugin.attributes.vpr.drivers.exploit_code_maturity |
The relative maturity of a possible exploit for the vulnerability based on the existence, sophistication, and prevalence of exploit intelligence from internal and external sources (for example, Reversinglabs, Exploit-db, Metasploit, etc.). The possible values ("High", "Functional", "PoC", or "Unproven") parallel the CVSS Exploit Code Maturity categories. |
keyword |
tenable_io.plugin.attributes.vpr.drivers.product_coverage |
The relative number of unique products affected by the vulnerability: Low, Medium, High, or Very High. |
keyword |
tenable_io.plugin.attributes.vpr.drivers.threat_intensity_last28 |
The relative intensity based on the number and frequency of recently observed threat events related to this vulnerability: Very Low, Low, Medium, High, or Very High. |
keyword |
tenable_io.plugin.attributes.vpr.drivers.threat_recency.lower_bound |
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 365 days), this value is "366". |
long |
tenable_io.plugin.attributes.vpr.drivers.threat_recency.upper_bound |
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category. |
long |
tenable_io.plugin.attributes.vpr.drivers.threat_sources_last28 |
A list of all sources (for example, social media channels, the dark web, etc.) where threat events related to this vulnerability occurred. Item type: string. |
keyword |
tenable_io.plugin.attributes.vpr.score |
The Vulnerability Priority Rating (VPR) for the vulnerability. If a plugin is designed to detect multiple vulnerabilities, the VPR represents the highest value calculated for a vulnerability associated with the plugin. |
double |
tenable_io.plugin.attributes.vpr.updated |
The ISO timestamp when Tenable Vulnerability Management last imported the VPR for this vulnerability. Tenable Vulnerability Management imports updated VPR values every time you run a scan. |
date |
tenable_io.plugin.attributes.vuln_publication_date |
date |
|
tenable_io.plugin.attributes.xref |
References to third-party information about the vulnerability, exploit, or update associated with the plugin presented as an array of strings. Each reference includes a type, for example, "FEDORA", and an ID, for example, "2003-047". |
keyword |
tenable_io.plugin.attributes.xrefs.id |
keyword |
|
tenable_io.plugin.attributes.xrefs.type |
keyword |
|
tenable_io.plugin.id |
The ID of the plugin. |
keyword |
tenable_io.plugin.name |
The name of the plugin. |
keyword |
vulnerability
editThis is the vulnerability
dataset.
Example
An example event for vulnerability
looks as following:
{ "@timestamp": "2018-12-31T20:59:47.000Z", "agent": { "ephemeral_id": "f945f2c2-fbaf-4b93-b6ca-7d51e6a0706d", "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "tenable_io.vulnerability", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "snapshot": false, "version": "8.12.0" }, "event": { "agent_id_status": "verified", "category": [ "vulnerability" ], "dataset": "tenable_io.vulnerability", "ingested": "2024-04-02T09:15:52Z", "kind": "state", "original": "{\"asset\":{\"fqdn\":\"example.com\",\"hostname\":\"89.160.20.112\",\"ipv4\":\"81.2.69.142\",\"network_id\":\"00000000-0000-0000-0000-000000000000\",\"operating_system\":[\"Test Demo OS X 10.5.8\"],\"tracked\":true,\"uuid\":\"cf165808-6a31-48e1-9cf3-c6c3174df51d\"},\"first_found\":\"2018-12-31T20:59:47Z\",\"indexed\":\"2022-11-30T14:09:12.061Z\",\"last_found\":\"2018-12-31T20:59:47Z\",\"output\":\"The observed version of Test is : \\n /21.0.1180.90\",\"plugin\":{\"cve\":[\"CVE-2016-1620\",\"CVE-2016-1614\",\"CVE-2016-1613\",\"CVE-2016-1612\",\"CVE-2016-1618\",\"CVE-2016-1617\",\"CVE-2016-1616\",\"CVE-2016-1615\",\"CVE-2016-1619\"],\"cvss_base_score\":9.3,\"cvss_temporal_score\":6.9,\"cvss_temporal_vector\":{\"exploitability\":\"Unproven\",\"raw\":\"E:U/RL:OF/RC:C\",\"remediation_level\":\"Official-fix\",\"report_confidence\":\"Confirmed\"},\"cvss_vector\":{\"access_complexity\":\"Medium\",\"access_vector\":\"Network\",\"authentication\":\"None required\",\"availability_impact\":\"Complete\",\"confidentiality_impact\":\"Complete\",\"integrity_impact\":\"Complete\",\"raw\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\"},\"description\":\"The version of Test on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \\n\\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1612)\\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction. An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps. An attacker can exploit this to access sensitive information. No other details are available. (CVE-2016-1614)\\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1615)\\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL. No other details are available. (CVE-2016-1616)\\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator. An attacker can exploit this to gain access to sensitive information. No other details are available. (CVE-2016-1618)\\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)\",\"family\":\"Web Clients\",\"family_id\":1000020,\"has_patch\":false,\"id\":9062,\"name\":\"Test \\u0026lt; 48.0.2564.82 Multiple Vulnerabilities\",\"risk_factor\":\"HIGH\",\"see_also\":[\"http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html\"],\"solution\":\"Update the browser to 48.0.2564.82 or later.\",\"synopsis\":\"The remote host is utilizing a web browser that is affected by multiple vulnerabilities.\",\"vpr\":{\"drivers\":{\"age_of_vuln\":{\"lower_bound\":366,\"upper_bound\":730},\"cvss3_impact_score\":5.9,\"cvss_impact_score_predicted\":false,\"exploit_code_maturity\":\"UNPROVEN\",\"product_coverage\":\"LOW\",\"threat_intensity_last28\":\"VERY_LOW\",\"threat_sources_last28\":[\"No recorded events\"]},\"score\":5.9,\"updated\":\"2019-12-31T10:08:58Z\"}},\"port\":{\"port\":\"0\",\"protocol\":\"TCP\"},\"scan\":{\"completed_at\":\"2018-12-31T20:59:47Z\",\"schedule_uuid\":\"6f7db010-9cb6-4870-b745-70a2aea2f81ce1b6640fe8a2217b\",\"started_at\":\"2018-12-31T20:59:47Z\",\"uuid\":\"0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904\"},\"severity\":\"low\",\"severity_default_id\":3,\"severity_id\":3,\"severity_modification_type\":\"NONE\",\"state\":\"OPEN\"}", "type": [ "info" ] }, "host": { "domain": "example.com", "id": "cf165808-6a31-48e1-9cf3-c6c3174df51d", "ip": [ "89.160.20.112", "81.2.69.142" ], "os": { "full": [ "Test Demo OS X 10.5.8" ] } }, "input": { "type": "cel" }, "related": { "hosts": [ "example.com" ], "ip": [ "89.160.20.112", "81.2.69.142" ] }, "tags": [ "preserve_original_event", "preserve_duplicate_custom_fields", "forwarded", "tenable_io-vulnerability" ], "tenable_io": { "vulnerability": { "asset": { "fqdn": "example.com", "ip_address": "89.160.20.112", "ipv4": "81.2.69.142", "network_id": "00000000-0000-0000-0000-000000000000", "operating_system": [ "Test Demo OS X 10.5.8" ], "tracked": true, "uuid": "cf165808-6a31-48e1-9cf3-c6c3174df51d" }, "first_found": "2018-12-31T20:59:47.000Z", "indexed": "2022-11-30T14:09:12.061Z", "last_found": "2018-12-31T20:59:47.000Z", "output": "The observed version of Test is : \n /21.0.1180.90", "plugin": { "cve": [ "CVE-2016-1620", "CVE-2016-1614", "CVE-2016-1613", "CVE-2016-1612", "CVE-2016-1618", "CVE-2016-1617", "CVE-2016-1616", "CVE-2016-1615", "CVE-2016-1619" ], "cvss": { "base_score": 9.3, "temporal": { "score": 6.9, "vector": { "exploitability": "Unproven", "raw": "E:U/RL:OF/RC:C", "remediation_level": "Official-fix", "report_confidence": "Confirmed" } }, "vector": { "access": { "complexity": "Medium", "vector": "Network" }, "authentication": "None required", "availability_impact": "Complete", "confidentiality_impact": "Complete", "integrity_impact": "Complete", "raw": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } }, "description": "The version of Test on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \n\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1612)\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction. An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps. An attacker can exploit this to access sensitive information. No other details are available. (CVE-2016-1614)\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1615)\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL. No other details are available. (CVE-2016-1616)\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator. An attacker can exploit this to gain access to sensitive information. No other details are available. (CVE-2016-1618)\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)", "family": "Web Clients", "family_id": 1000020, "has_patch": false, "id": 9062, "name": "Test < 48.0.2564.82 Multiple Vulnerabilities", "risk_factor": "HIGH", "see_also": [ "http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html" ], "solution": "Update the browser to 48.0.2564.82 or later.", "synopsis": "The remote host is utilizing a web browser that is affected by multiple vulnerabilities.", "vpr": { "drivers": { "age_of_vuln": { "lower_bound": 366, "upper_bound": 730 }, "cvss3_impact_score": 5.9, "cvss_impact_score_predicted": false, "exploit_code_maturity": "UNPROVEN", "product_coverage": "LOW", "threat_intensity_last28": "VERY_LOW", "threat_sources_last28": [ "No recorded events" ] }, "score": 5.9, "updated": "2019-12-31T10:08:58.000Z" } }, "port": { "protocol": "TCP", "value": 0 }, "scan": { "completed_at": "2018-12-31T20:59:47.000Z", "schedule_uuid": "6f7db010-9cb6-4870-b745-70a2aea2f81ce1b6640fe8a2217b", "started_at": "2018-12-31T20:59:47.000Z", "uuid": "0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904" }, "severity": { "default_id": 3, "id": 3, "modification_type": "NONE", "value": "low" }, "state": "OPEN" } }, "vulnerability": { "category": [ "Web Clients" ], "classification": "CVSS", "description": "The version of Test on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \n\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1612)\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction. An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps. An attacker can exploit this to access sensitive information. No other details are available. (CVE-2016-1614)\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1615)\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL. No other details are available. (CVE-2016-1616)\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator. An attacker can exploit this to gain access to sensitive information. No other details are available. (CVE-2016-1618)\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)", "enumeration": "CVE", "id": [ "CVE-2016-1620", "CVE-2016-1614", "CVE-2016-1613", "CVE-2016-1612", "CVE-2016-1618", "CVE-2016-1617", "CVE-2016-1616", "CVE-2016-1615", "CVE-2016-1619" ], "reference": [ "http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html" ], "report_id": "0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904", "scanner": { "vendor": "Tenable" }, "score": { "version": "3.0" }, "severity": "low" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
tenable_io.vulnerability.asset.agent_uuid |
The UUID of the agent that performed the scan where the vulnerability was found. |
keyword |
tenable_io.vulnerability.asset.bios_uuid |
The BIOS UUID of the asset where the vulnerability was found. |
keyword |
tenable_io.vulnerability.asset.device_type |
The type of asset where the vulnerability was found. |
keyword |
tenable_io.vulnerability.asset.fqdn |
The fully-qualified domain name of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.hostname |
The host name of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.ip_address |
keyword |
|
tenable_io.vulnerability.asset.ipv4 |
The IPv4 address of the asset where a scan found the vulnerability. |
ip |
tenable_io.vulnerability.asset.ipv6 |
The IPv6 address of the asset where a scan found the vulnerability. |
ip |
tenable_io.vulnerability.asset.last_authenticated_results |
The last date credentials were used successfully to scan the asset. |
date |
tenable_io.vulnerability.asset.last_unauthenticated_results |
The last date when the asset was scanned without using credentials |
date |
tenable_io.vulnerability.asset.mac_address |
The MAC address of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.netbios.name |
The NETBIOS name of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.netbios.workgroup |
The NETBIOS workgroup of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.network_id |
The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000 |
keyword |
tenable_io.vulnerability.asset.operating_system |
The operating system of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.asset.tracked |
A value specifying whether Tenable Vulnerability Management tracks the asset in the asset management system. Tenable Vulnerability Management still assigns untracked assets identifiers in scan results, but these identifiers change with each new scan of the asset. This parameter is relevant to PCI-type scans and in certain cases where there is not enough information in a scan to identify the asset. Untracked assets appear in the scan history, but do not appear in workbenches or reports. |
boolean |
tenable_io.vulnerability.asset.uuid |
The UUID of the asset where a scan found the vulnerability. |
keyword |
tenable_io.vulnerability.first_found |
The ISO date when a scan first detected the vulnerability on the asset. |
date |
tenable_io.vulnerability.indexed |
The date and time (in Unix time) when the vulnerability was indexed into Tenable Vulnerability Management. |
date |
tenable_io.vulnerability.last_fixed |
The ISO date when a scan no longer detects the previously detected vulnerability on the asset. |
date |
tenable_io.vulnerability.last_found |
The ISO date when a scan last detected the vulnerability on the asset. |
date |
tenable_io.vulnerability.output |
The text output of the Nessus scanner. |
keyword |
tenable_io.vulnerability.plugin.always_run |
boolean |
|
tenable_io.vulnerability.plugin.bid |
The Bugtraq ID for the plugin. |
long |
tenable_io.vulnerability.plugin.canvas_package |
The name of the CANVAS exploit pack that includes the vulnerability. |
keyword |
tenable_io.vulnerability.plugin.checks_for_default_account |
A value specifying whether the plugin checks for default accounts. |
boolean |
tenable_io.vulnerability.plugin.checks_for_malware |
A value specifying whether the plugin checks for malware. |
boolean |
tenable_io.vulnerability.plugin.compliance |
boolean |
|
tenable_io.vulnerability.plugin.cpe |
The Common Platform Enumeration (CPE) number for the plugin. |
keyword |
tenable_io.vulnerability.plugin.cve |
The Common Vulnerability and Exposure (CVE) ID for the plugin. |
keyword |
tenable_io.vulnerability.plugin.cvss.base_score |
The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments) |
double |
tenable_io.vulnerability.plugin.cvss.temporal.score |
The CVSSv2 temporal score (characteristics of a vulnerability that change over time but not among user environments). |
double |
tenable_io.vulnerability.plugin.cvss.temporal.vector.exploitability |
The CVSSv2 Exploitability (E) temporal metric for the vulnerability the plugin covers. Possible values include: U, POC, F, H and ND. |
keyword |
tenable_io.vulnerability.plugin.cvss.temporal.vector.raw |
The complete cvss_temporal_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, E:U/RL:OF/RC:C. |
keyword |
tenable_io.vulnerability.plugin.cvss.temporal.vector.remediation_level |
The CVSSv2 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. Possible values include: OF, TF ,W, U and ND. |
keyword |
tenable_io.vulnerability.plugin.cvss.temporal.vector.report_confidence |
The CVSSv2 Report Confidence (RC) temporal metric for the vulnerability the plugin covers. Possible values include: UC, UR, C and ND. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.access.complexity |
The CVSSv2 Access Complexity (AC) metric for the vulnerability the plugin covers. Possible values include: H, M and L. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.access.vector |
The CVSSv2 Access Vector (AV) metric for the vulnerability the plugin covers. Possible values include: L,A and N. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.authentication |
The CVSSv2 Authentication (Au) metric for the vulnerability the plugin covers. Possible values include N, S and M. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.availability_impact |
The CVSSv2 availability impact metric for the vulnerability the plugin covers. Possible values include N, P and C. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.confidentiality_impact |
The CVSSv2 confidentiality impact metric for the vulnerability the plugin covers. Possible values include: N, P and C. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.integrity_impact |
The CVSSv2 integrity impact metric for the vulnerability the plugin covers. Possible values include: N, P and C. |
keyword |
tenable_io.vulnerability.plugin.cvss.vector.raw |
The complete cvss_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, AV:N/AC:M/Au:N/C:C/I:C/A:C. |
keyword |
tenable_io.vulnerability.plugin.cvss3.base_score |
The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). |
double |
tenable_io.vulnerability.plugin.cvss3.temporal.score |
The CVSSv3 temporal score (characteristics of a vulnerability that change over time but not among user environments). |
double |
tenable_io.vulnerability.plugin.cvss3.temporal.vector.exploit_code_maturity |
keyword |
|
tenable_io.vulnerability.plugin.cvss3.temporal.vector.exploitability |
The CVSSv3 Exploit Maturity Code (E) for the vulnerability the plugin covers. Possible values include: Unproven, Proof-of-concept, Functional, High and Not-defined. |
keyword |
tenable_io.vulnerability.plugin.cvss3.temporal.vector.raw |
The complete cvss3_temporal_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, E:U/RL:OF/RC:C. |
keyword |
tenable_io.vulnerability.plugin.cvss3.temporal.vector.remediation_level |
The CVSSv3 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. Possible values include:O, T, W, U, X. |
keyword |
tenable_io.vulnerability.plugin.cvss3.temporal.vector.report_confidence |
The CVSSv3 Report Confidence (RC) temporal metric for the vulnerability the plugin covers. Possible values include: U R, C, X. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.access.complexity |
The CVSSv3 Access Complexity (AC) metric for the vulnerability the plugin covers. Possible values include: H, M, L. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.access.vector |
The CVSSv2 Attack Vector (AV) metric for the vulnerability the plugin covers. Possible values include: Network ,Adjacent Network, Local. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.attack.complexity |
keyword |
|
tenable_io.vulnerability.plugin.cvss3.vector.attack.vector |
keyword |
|
tenable_io.vulnerability.plugin.cvss3.vector.authentication |
The CVSSv2 Authentication (Au) metric for the vulnerability the plugin covers. Possible values include: None required, Requires-single-instance, Requires-multiple-instances. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.availability_impact |
The CVSSv2 availability impact metric for the vulnerability the plugin covers. Possible values include: H, M, L. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.confidentiality_impact |
The CVSSv3 confidentiality impact metric of the vulnerability the plugin covers to the vulnerable component. Possible values include: H, M, L. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.integrity_impact |
The CVSSv3 integrity impact metric for the vulnerability the plugin covers. Possible values include: H. M, L. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.privileges_required |
keyword |
|
tenable_io.vulnerability.plugin.cvss3.vector.raw |
The complete cvss3_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, AV:N/AC:M/Au:N/C:C/I:C/A:C. |
keyword |
tenable_io.vulnerability.plugin.cvss3.vector.scope |
keyword |
|
tenable_io.vulnerability.plugin.cvss3.vector.user_interaction |
keyword |
|
tenable_io.vulnerability.plugin.d2_elliot_name |
The name of the exploit in the D2 Elliot Web Exploitation framework. |
keyword |
tenable_io.vulnerability.plugin.description |
Full text description of the vulnerability plugin. |
text |
tenable_io.vulnerability.plugin.exploit_available |
A value specifying whether a public exploit exists for the vulnerability. |
boolean |
tenable_io.vulnerability.plugin.exploit_framework.canvas |
A value specifying whether an exploit exists in the Immunity CANVAS framework. |
boolean |
tenable_io.vulnerability.plugin.exploit_framework.core |
A value specifying whether an exploit exists in the CORE Impact framework. |
boolean |
tenable_io.vulnerability.plugin.exploit_framework.d2_elliot |
A value specifying whether an exploit exists in the D2 Elliot Web Exploitation framework. |
boolean |
tenable_io.vulnerability.plugin.exploit_framework.hub |
A value specifying whether an exploit exists in the ExploitHub framework. |
boolean |
tenable_io.vulnerability.plugin.exploit_framework.metasploit |
A value specifying whether an exploit exists in the Metasploit framework. |
boolean |
tenable_io.vulnerability.plugin.exploitability_ease |
Description of how easy it is to exploit the issue. |
keyword |
tenable_io.vulnerability.plugin.exploited_by.malware |
The vulnerability discovered by this plugin is known to be exploited by malware. |
boolean |
tenable_io.vulnerability.plugin.exploited_by.nessus |
A value specifying whether Nessus exploited the vulnerability during the process of identification. |
boolean |
tenable_io.vulnerability.plugin.exploithub_sku |
The SKU number of the exploit in the ExploitHub framework. |
keyword |
tenable_io.vulnerability.plugin.family |
The family to which plugin belongs. |
keyword |
tenable_io.vulnerability.plugin.family_id |
The ID of the plugin family. |
long |
tenable_io.vulnerability.plugin.has_patch |
A value specifying whether the vendor has published a patch for the vulnerability. |
boolean |
tenable_io.vulnerability.plugin.id |
The ID of the plugin that identified the vulnerability. |
long |
tenable_io.vulnerability.plugin.in_the_news |
A value specifying whether this plugin has received media attention (for example, ShellShock, Meltdown). |
boolean |
tenable_io.vulnerability.plugin.intel_type |
keyword |
|
tenable_io.vulnerability.plugin.io_address |
keyword |
|
tenable_io.vulnerability.plugin.metasploit_name |
The name of the related exploit in the Metasploit framework. |
keyword |
tenable_io.vulnerability.plugin.modification_date |
The date on which the plugin was last modified. |
date |
tenable_io.vulnerability.plugin.ms_bulletin |
The Microsoft security bulletin that the plugin covers. |
keyword |
tenable_io.vulnerability.plugin.name |
The name of the plugin that identified the vulnerability. |
keyword |
tenable_io.vulnerability.plugin.patch_publication_date |
The date on which the vendor published a patch for the vulnerability. |
date |
tenable_io.vulnerability.plugin.plugin_modification_date |
date |
|
tenable_io.vulnerability.plugin.plugin_publication_date |
date |
|
tenable_io.vulnerability.plugin.publication_date |
The date on which the plugin was published. |
date |
tenable_io.vulnerability.plugin.risk_factor |
The risk factor associated with the plugin. Possible values are: Low, Medium, High, or Critical. |
keyword |
tenable_io.vulnerability.plugin.see_also |
Links to external websites that contain helpful information about the vulnerability. |
keyword |
tenable_io.vulnerability.plugin.solution |
Remediation information for the vulnerability. |
keyword |
tenable_io.vulnerability.plugin.stig_severity |
Security Technical Implementation Guide (STIG) severity code for the vulnerability. |
keyword |
tenable_io.vulnerability.plugin.synopsis |
Brief description of the plugin or vulnerability. |
keyword |
tenable_io.vulnerability.plugin.type |
The general type of plugin check (for example, local or remote). |
keyword |
tenable_io.vulnerability.plugin.unsupported_by_vendor |
Software found by this plugin is unsupported by the software’s vendor (for example, Windows 95 or Firefox 3). |
boolean |
tenable_io.vulnerability.plugin.usn |
Ubuntu security notice that the plugin covers. |
keyword |
tenable_io.vulnerability.plugin.version |
The version of the plugin used to perform the check. |
version |
tenable_io.vulnerability.plugin.vpr.drivers.age_of_vuln.lower_bound |
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 730 days), this value is "731". |
long |
tenable_io.vulnerability.plugin.vpr.drivers.age_of_vuln.upper_bound |
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category. |
long |
tenable_io.vulnerability.plugin.vpr.drivers.cvss3_impact_score |
The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did not provide a score, Tenable Vulnerability Management displays a Tenable-predicted score. |
double |
tenable_io.vulnerability.plugin.vpr.drivers.cvss_impact_score_predicted |
A value specifying whether Tenable predicted the CVSSv3 impact score for the vulnerability because NVD did not provide one (true) or used the NVD-provided CVSSv3 impact score (false) when calculating the VPR. |
boolean |
tenable_io.vulnerability.plugin.vpr.drivers.exploit_code_maturity |
The relative maturity of a possible exploit for the vulnerability based on the existence, sophistication, and prevalence of exploit intelligence from internal and external sources (for example, Reversinglabs, Exploit-db, Metasploit, etc.). The possible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit Code Maturity categories. |
keyword |
tenable_io.vulnerability.plugin.vpr.drivers.product_coverage |
The relative number of unique products affected by the vulnerability: Low, Medium, High, or Very High. |
keyword |
tenable_io.vulnerability.plugin.vpr.drivers.threat_intensity_last28 |
The relative intensity based on the number and frequency of recently observed threat events related to this vulnerability: Very Low, Low, Medium, High, or Very High. |
keyword |
tenable_io.vulnerability.plugin.vpr.drivers.threat_recency.lower_bound |
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 365 days), this value is "366". |
long |
tenable_io.vulnerability.plugin.vpr.drivers.threat_recency.upper_bound |
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category. |
long |
tenable_io.vulnerability.plugin.vpr.drivers.threat_sources_last28 |
A list of all sources (for example, social media channels, the dark web, etc.) where threat events related to this vulnerability occurred. Item type: string. |
keyword |
tenable_io.vulnerability.plugin.vpr.score |
The Vulnerability Priority Rating (VPR) for the vulnerability. If a plugin is designed to detect multiple vulnerabilities, the VPR represents the highest value calculated for a vulnerability associated with the plugin. |
double |
tenable_io.vulnerability.plugin.vpr.updated |
The ISO timestamp when Tenable Vulnerability Management last imported the VPR for this vulnerability. Tenable Vulnerability Management imports updated VPR values every time you run a scan. |
date |
tenable_io.vulnerability.plugin.vuln_publication_date |
The publication date of the plugin. |
date |
tenable_io.vulnerability.plugin.xref.id |
keyword |
|
tenable_io.vulnerability.plugin.xref.type |
keyword |
|
tenable_io.vulnerability.plugin.xrefs.id |
keyword |
|
tenable_io.vulnerability.plugin.xrefs.type |
keyword |
|
tenable_io.vulnerability.port.protocol |
The protocol the scanner used to communicate with the asset. |
keyword |
tenable_io.vulnerability.port.service |
The service the scanner used to communicate with the asset. |
keyword |
tenable_io.vulnerability.port.value |
The port the scanner used to communicate with the asset. |
long |
tenable_io.vulnerability.recast.reason |
The text that appears in the Comment field of the recast rule in the Tenable Vulnerability Management user interface. |
keyword |
tenable_io.vulnerability.recast.rule_uuid |
The UUID of the recast rule that applies to the plugin. |
keyword |
tenable_io.vulnerability.scan.completed_at |
The ISO timestamp when the scan completed. |
date |
tenable_io.vulnerability.scan.schedule_uuid |
The schedule UUID for the scan that found the vulnerability. |
keyword |
tenable_io.vulnerability.scan.started_at |
The ISO timestamp when the scan started. |
date |
tenable_io.vulnerability.scan.uuid |
The UUID of the scan that found the vulnerability. |
keyword |
tenable_io.vulnerability.severity.default_id |
The code for the severity originally assigned to a vulnerability before a user recast the risk associated with the vulnerability. Possible values are the same as for the severity_id attribute. |
long |
tenable_io.vulnerability.severity.id |
The code for the severity assigned when a user recast the risk associated with the vulnerability. Possible values include: 0,1,2,3 and 4. |
long |
tenable_io.vulnerability.severity.modification_type |
The type of modification a user made to the vulnerability’s severity. Possible values include:none, recasted and accepted. |
keyword |
tenable_io.vulnerability.severity.value |
The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. Possible values include info, low, medium, high and critical. |
keyword |
tenable_io.vulnerability.state |
The state of the vulnerability as determined by the Tenable Vulnerability Management state service. Possible values include: open, reopen and fixed. |
keyword |
vulnerability.description |
The description of the vulnerability. |
text |
scan
editThis is the scan
dataset.
Example
An example event for scan
looks as following:
{ "@timestamp": "2024-04-02T09:14:42.329Z", "agent": { "ephemeral_id": "f945f2c2-fbaf-4b93-b6ca-7d51e6a0706d", "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.12.0" }, "data_stream": { "dataset": "tenable_io.scan", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "a0570906-16fc-4c38-821f-7c3aa6ed04bb", "snapshot": false, "version": "8.12.0" }, "event": { "agent_id_status": "verified", "category": [ "configuration" ], "dataset": "tenable_io.scan", "ingested": "2024-04-02T09:14:52Z", "kind": "state", "original": "{\"control\":true,\"creation_date\":1683282785,\"enabled\":true,\"has_triggers\":false,\"id\":195,\"last_modification_date\":1683283158,\"legacy\":false,\"name\":\"Client Discovery\",\"owner\":\"jdoe@contoso.com\",\"permissions\":128,\"policy_id\":194,\"progress\":100,\"read\":false,\"rrules\":\"FREQ=WEEKLY;INTERVAL=1;BYDAY=FR\",\"schedule_uuid\":\"11c56dea-as5f-65ce-ad45-9978045df65ecade45b6e3a76871\",\"shared\":true,\"starttime\":\"20220708T033000\",\"status\":\"completed\",\"status_times\":{\"initializing\":2623,\"pending\":52799,\"processing\":1853,\"publishing\":300329,\"running\":15759},\"template_uuid\":\"a1efc3b4-cd45-a65d-fbc4-0079ebef4a56cd32a05ec2812bcf\",\"timezone\":\"America/Los_Angeles\",\"total_targets\":21,\"type\":\"remote\",\"user_permissions\":128,\"uuid\":\"a456ef1c-cbd4-ad41-f654-119b766ff61f\",\"wizard_uuid\":\"32cbd657-fe65-a45e-a45f-0079eb89e56a1c23fd5ec2812bcf\"}", "type": [ "info" ] }, "input": { "type": "cel" }, "tags": [ "preserve_original_event", "forwarded", "tenable_io-scan" ], "tenable_io": { "scan": { "control": true, "creation_date": "2023-05-05T10:33:05.000Z", "enabled": true, "has_triggers": false, "id": 195, "last_modification_date": "2023-05-05T10:39:18.000Z", "legacy": false, "name": "Client Discovery", "owner": "jdoe@contoso.com", "permissions": 128, "policy_id": 194, "progress": 100, "read": false, "rrules": "FREQ=WEEKLY;INTERVAL=1;BYDAY=FR", "schedule_uuid": "11c56dea-as5f-65ce-ad45-9978045df65ecade45b6e3a76871", "shared": true, "starttime": "2022-07-08T03:30:00.000Z", "status": "completed", "status_times": { "initializing": 2623, "pending": 52799, "processing": 1853, "publishing": 300329, "running": 15759 }, "template_uuid": "a1efc3b4-cd45-a65d-fbc4-0079ebef4a56cd32a05ec2812bcf", "timezone": "America/Los_Angeles", "total_targets": 21, "type": "remote", "user_permissions": 128, "uuid": "a456ef1c-cbd4-ad41-f654-119b766ff61f", "wizard_uuid": "32cbd657-fe65-a45e-a45f-0079eb89e56a1c23fd5ec2812bcf" } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
tenable_io.scan.control |
If true, the scan has a schedule and can be launched. |
boolean |
tenable_io.scan.creation_date |
For newly-created scans, the date on which the scan configuration was originally created. For scans that have been launched at least once, this attribute does not represent the date on which the scan configuration was originally created. Instead, it represents the date on which the scan was first launched, in Unix time format. |
date |
tenable_io.scan.enabled |
Indicates whether the scan schedule is active (true) or inactive (false). |
boolean |
tenable_io.scan.has_triggers |
boolean |
|
tenable_io.scan.id |
The unique ID of the scan. |
long |
tenable_io.scan.last_modification_date |
For newly-created scans, the date on which the scan configuration was created. For scans that have been launched at least once, this attribute does not represent the date on which the scan configuration was last modified. Instead, it represents the date on which the scan was last launched, in Unix time format. Tenable Vulnerability Management updates this attribute each time the scan launches. |
date |
tenable_io.scan.legacy |
A value indicating whether the scan results were created before a change in storage method. If true, Tenable Vulnerability Management stores the results in the old storage method. If false, Tenable Vulnerability Management stores the results in the new storage method. |
boolean |
tenable_io.scan.name |
The name of the scan. |
keyword |
tenable_io.scan.owner |
The owner of the scan. |
keyword |
tenable_io.scan.permissions |
The requesting user’s permissions for the scan. |
long |
tenable_io.scan.policy_id |
The unique ID of the user-defined template (policy) on which the scan configuration is based. |
long |
tenable_io.scan.progress |
The progress of the scan ranging from 0 to 100. |
long |
tenable_io.scan.read |
A value indicating whether the user account associated with the request message has viewed the scan in the Tenable Vulnerability Management user interface. If 1, the user account has viewed the scan results. |
boolean |
tenable_io.scan.rrules |
The interval at which the scan repeats. The interval is formatted as a string of three values delimited by semi-colons. These values are the frequency (FREQ=ONETIME or DAILY or WEEKLY or MONTHLY or YEARLY), the interval (INTERVAL=1 or 2 or 3 … x), and the days of the week (BYDAY=SU,MO,TU,WE,TH,FR,SA). For a scan that runs every three weeks on Monday Wednesday and Friday, the string would be FREQ=WEEKLY;INTERVAL=3;BYDAY=MO,WE,FR. If the scan is not scheduled to recur, this attribute is null. For more information, see rrules Format. |
keyword |
tenable_io.scan.schedule_uuid |
The UUID for a specific instance in the scan schedule. |
keyword |
tenable_io.scan.shared |
If true, the scan is shared with users other than the scan owner. The level of sharing is specified in the acls attribute of the scan details. |
boolean |
tenable_io.scan.starttime |
For one-time scans, the starting time and date for the scan. For recurrent scans, the first date on which the scan schedule is active and the time that recurring scans launch based on the rrules attribute. |
date |
tenable_io.scan.status |
The status of the scan. Possible values are - aborted, canceled, completed, empty, imported, initializing, pausing, paused, pending, processing, publishing, resuming, running, stopped, stopping |
keyword |
tenable_io.scan.status_times.initializing |
long |
|
tenable_io.scan.status_times.pending |
long |
|
tenable_io.scan.status_times.processing |
long |
|
tenable_io.scan.status_times.publishing |
long |
|
tenable_io.scan.status_times.running |
long |
|
tenable_io.scan.template_uuid |
The UUID of the template. |
keyword |
tenable_io.scan.timezone |
The timezone of the scheduled start time for the scan. |
keyword |
tenable_io.scan.total_targets |
The total number of targets in the scan. |
long |
tenable_io.scan.type |
The type of scan. |
keyword |
tenable_io.scan.user_permissions |
The sharing permissions for the scan. |
long |
tenable_io.scan.uuid |
The UUID of the scan. |
keyword |
tenable_io.scan.wizard_uuid |
The UUID of the Tenable-provided template used to create either the scan or the user-defined template (policy) on which the scan configuration is based. |
keyword |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
3.5.0 |
Enhancement (View pull request) |
8.13.0 or higher |
3.4.0 |
Enhancement (View pull request) |
8.13.0 or higher |
3.3.0 |
Enhancement (View pull request) |
8.13.0 or higher |
3.2.1 |
Bug fix (View pull request) Bug fix (View pull request) |
8.13.0 or higher |
3.2.0 |
Enhancement (View pull request) |
8.13.0 or higher |
3.1.1 |
Bug fix (View pull request) |
8.13.0 or higher |
3.1.0 |
Enhancement (View pull request) |
8.13.0 or higher |
3.0.1 |
Bug fix (View pull request) |
8.12.0 or higher |
3.0.0 |
Enhancement (View pull request) Bug fix (View pull request) |
8.12.0 or higher |
2.9.0 |
Enhancement (View pull request) |
8.12.0 or higher |
2.8.1 |
Enhancement (View pull request) |
8.7.1 or higher |
2.8.0 |
Enhancement (View pull request) Enhancement (View pull request) |
8.7.1 or higher |
2.7.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.6.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.5.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.4.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.3.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.2.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.1.1 |
Enhancement (View pull request) |
8.7.1 or higher |
2.1.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.0.1 |
Bug fix (View pull request) Bug fix (View pull request) Bug fix (View pull request) |
8.7.1 or higher |
2.0.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.3.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.2.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.1.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.0.0 |
Enhancement (View pull request) |
8.7.1 or higher |
0.8.0 |
Enhancement (View pull request) |
— |
0.7.0 |
Enhancement (View pull request) |
— |
0.6.1 |
Bug fix (View pull request) |
— |
0.6.0 |
Enhancement (View pull request) |
— |
0.5.0 |
Enhancement (View pull request) |
— |
0.4.0 |
Enhancement (View pull request) |
— |
0.3.0 |
Enhancement (View pull request) |
— |
0.2.1 |
Bug fix (View pull request) |
— |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |