Vulnerability Scanning

Vulnerability Scanning

Overview

Vulnerability scanning identifies known CVEs (Common Vulnerabilities and Exposures) in installed packages on your Linux servers. Unlike compliance scanning (which checks configuration against CIS Benchmarks), vulnerability scanning detects outdated software with known security flaws.

SecureBaseline Cloud includes a built-in vulnerability scanning engine with multiple vulnerability databases.

Vulnerability Databases

DatabaseSourceContent
NVD CVENISTCVE entries (2020-2026)
OVALUbuntu, Debian, RedHat, Oracle, Amazon, SUSE, AlpineOS-specific vulnerability definitions
GOSTRedHat, Debian, UbuntuSecurity tracker data
ExploitDBOffensive SecurityKnown exploits and POCs
CPENISTCommon Platform Enumeration
MetasploitRapid7Metasploit module mappings
MITRE ATT&CKMITREThreat intelligence and technique mappings
CISA KEVCISAKnown Exploited Vulnerabilities catalog
FSTEC BDUFSTEC RussiaRussian vulnerability database (auto-synced every 24 hours)

Running a Vulnerability Scan

  1. Navigate to Vulnerabilities
  2. Click New Scan
  3. Select target host(s)
  4. Click Start Scan

Scan duration depends on the number of installed packages (typically 2-5 minutes per host).

Understanding Results

Each finding includes:

FieldDescription
CVE IDUnique vulnerability identifier (e.g., CVE-2024-1234)
SeverityCritical, High, Medium, or Low
PackageAffected package name and version
Fixed VersionVersion with the fix (if available)
Exploit AvailableWhether a public exploit exists
Patch StatusWhether a patch is available from the OS vendor
CVSS ScoreNumerical severity score (0-10)

Filtering and Search

Filter findings by:

  • Severity level (Critical, High, Medium, Low)
  • Exploit availability
  • Patch availability
  • Package name
  • CVE ID

Trends

The Vulnerabilities page shows trends over time:

  • Total CVE count per scan
  • Severity distribution changes
  • New vs. resolved vulnerabilities

Reports

Export vulnerability scan results in:

  • JSON - machine-readable format for integration
  • CSV - spreadsheet format for analysis
  • PDF - printable report for compliance documentation

FSTEC BDU Integration

SecureBaseline Cloud integrates with the Russian FSTEC BDU (Bank of Threats and Vulnerabilities). The database syncs automatically:

  • On startup - initial sync when API starts
  • Every 24 hours - periodic background sync
  • Manual trigger - available via admin API endpoint

FSTEC BDU data enriches vulnerability findings with Russian-language descriptions and FSTEC-specific identifiers.

CVE Database Updates

Vulnerability databases are pre-loaded into the VM image during Packer build. Updates occur:

  • At VM image build time (all databases baked in)
  • Via automatic sync on first boot (if databases are missing or corrupted)
  • The scanning engine validates all databases on startup

See Also

Last updated on