Firmware Vulnerability Management
Firmware vulnerabilities can put your business and your customers’ sensitive data at risk, leading to easy entry to hackers, diminished sales, reputation loss and penalties. In order to avoid these mishaps, it is important to identify firmware vulnerabilities and take corrective measures regularly.
With Network Configuration Manager, you can now identify potential vulnerabilities in your network devices and take action. Network Configuration Manager works in accordance with NIST (National Institute of Standards and Technology) by fetching firmware vulnerability data and correlating it with the network devices which are currently managed in your infrastructure. At present, Network Configuration Manager helps to manage firmware vulnerability for Cisco IOS, Cisco ASA, Cisco Nexus and Juniper devices.
Viewing Firmware Vulnerabilities in your network
In Firmware Vulnerabilities page, Network Configuration Manager lists out all the vulnerabilities in your network and the number of devices affected by those vulnerabilities. You can view the details of that vulnerability associated to a particular CVE ID and immediately carry out the remediation methods.
Viewing CVE ID details and taking remediation measures
By clicking on the CVE ID, you can you can get in-depth information about the firmware vulnerability.
Date of publishing/modification: In the CVE details page, you can see the date the CVE id was published and last modified.
Vulnerability summary: You can also see the summary which shows information about what the vulnerability is and on which device the vulnerability was reported first.
Reference URL: You can also see reference URLs, which provides vulnerability patches for remediation.
Vulnerability status: You can see a status bar with options to mark the status of the vulnerability. You can edit this status anytime.
How Network Configuration Manager categorizes firmware vulnerabilities
Network Configuration Manager categorizes the severity of vulnerabilities based on the "Base score" which is calculated based on a few metrics like Exploitability Metrics(Attack, Complexity, Authentication) and Impact Metrics(Confidentiality, Integrity, Availability). Here is the split up of how the severity is categorized:
- Base score 9.0 - 10 - Critical
- Base score 7.0 - 8.9 - Important
- Base score 4.0 - 6.9 - Moderate
- Base score 0 - 3.9 - Low
Firmware Vulnerability DB sync
Vulnerability data from NIST can be synced with the DB of Network Configuration Manager. Users can set a time of schedule in order to sync data on a daily basis. When a schedule time is set, the synchronization of vulnerability data happens automatically at the exact time of schedule. Network Configuration Manager also allows you to edit/change the time of schedule as per your convenience. If no schedule time is set, sync happens every night at 2 a.m by default.
If you wish to update the Vulnerability data in the NCM UI immediately instead of the scheduled time, you can give the "Update Now" option. When "Update Now" is given, the latest vulnerability data will be updated in the NCM DB.
Note: If yours is a closed network, live data sync is not possible. We are working on supporting manual import of vulnerability data for closed networks.
Firmware Vulnerability Report
Network Configuration Manager provides reports on firmware vulnerability to help you gain clarity into the affected devices, its status and the remediation for the vulnerability. You can export the report as a PDF, CSV file or get the report via Email.
With "Advanced CVE search" you can globally search for all the vulnerabilities by searching using the vendor name, CVE ID, device OS number, version or a model. For eg: If you search "Cisco IOS 7000", all the vulnerabilities present in that particular model will be listed. On further clicking it, you will be able to see all the details of the vulnerability corresponding to a particular CVE ID.
Thus, Network Configuration Manager helps you achieve in-depth management of all the vulnerabilities in your network. Try out Network Configuration Manager using the 30-day free trial
and see how you can manage vulnerabilities in your network!