Security Center can detect Linux software vulnerabilities and allows you to fix the vulnerabilities with a few clicks. This topic describes how to view and handle Linux software vulnerabilities.
Limits
The Basic and Anti-virus editions of Security Center detect but do not fix vulnerabilities. To use Security Center to fix vulnerabilities with a few clicks, you must purchase the Advanced, Enterprise, or Ultimate edition. For more information about the features supported by different Security Center editions, see Features.
View the basic information about a vulnerability
View and handle vulnerabilities
Description of the panel that shows the vulnerability details
Parameter | Description |
---|---|
CVE ID | The CVE ID of the vulnerability. The CVE system provides a reference method for publicly known information-security vulnerabilities and exposures. You can use CVE IDs, such as CVE-2018-1123, to query relevant information about vulnerability fixes in databases that are compatible with CVE. This way, security issues can be resolved. |
Impact | The value of the Impact parameter is a Common Vulnerability Scoring System (CVSS)
score. The CVSS score follows the widely accepted industry standard and is calculated
by using the formula that depends on several attributes of the vulnerability. This
score is used to determine the severity of the vulnerability.
The following list describes the severity rating scale in CVSS v3.0:
|
Affected Assets | The details about assets that are affected by the vulnerability, including the public and private IP addresses of the assets. |
Priority | The vulnerability priority. The following items describe the priorities:
|
Details | In the panel, find a vulnerability and click Details in the Actions column to view the details about the vulnerability.
|
References
How often does Security Center detect vulnerabilities?
What are the differences between baselines and vulnerabilities?
What do I do if I cannot enable the vulnerability detection feature for a server on the Assets page?