Tenable.sc CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.0 |
Compatible with ThreatQ Versions | >= 5.29.0 |
Support Tier | ThreatQ Supported |
Introduction
The Tenable.SC CDF captures vulnerability data from Tenable.sc and ingests it into the ThreatQ platform. Additionally, users have the option to configure the integration to ingest IP Addresses from Tenable.sc as Assets in ThreatQ and relate them back to the relevant vulnerabilities.
The integration provides the following feeds:
- Tenable.sc Vulnerabilities - Collects vulnerabilities from Tenable.sc from a specific historical period.
- Get Tenable.sc IP Assets (Supplemental) - Collects IP Addresses Assets from Tenable.sc from a specific historical period.
- Get Tenable.sc CVEs (Supplemental) - Collects CVEs from Tenable.sc and ingests them into ThreatQ as Vulnerabilities or Indicators, based on user selection.
The integration ingests the following object types:
- Assets
- Indicators
- Vulnerabilities
Prerequisites
You will need the following to run the integration:
- API access and secret keys for a Tenable.sc account with the privileges to see vulnerability scans.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration yaml file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Tenable.sc Host The hostname or IP address for the Tenable.sc server. The scheme is not required. API Access Key The API access key for the user that has privileges to access scan result and vulnerability data. API Secret Key The secret key associated with the API access key above. Enable Capture of Asset Information Enable this parameter to ingest all the related alerts even if they do not satisfy the previously configured filters. Severity Selection Select Minimum Severity for search filters. Options include: - Critical
- High
- Medium
- Low (default)
- Info
Exploitability Selection Select whether to search for exploitable in search filters. Options include: - No
- Yes
- Both (default)
Context Filter Select one or more pieces of context to bring into ThreatQ with the vulnerability. Options include: - Repository (default)
- Cross-Reference (default)
- See Also Link
- Plugin Output
Ingest CVEs As Select the ThreatQ object type to ingest the CVEs into ThreatQ. Options include Indicators and Vulnerabilities (default). Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Tenable.sc Vulnerabilities
The Tenable.sc Vulnerabilities feed collects vulnerabilities from Tenable.sc from a specific historical period.
POST {host}/rest/analysis
Sample Request:
{
"query": {
"filters": [
{
"filterName": "lastSeen",
"operator": "=",
"value": "1716460215-1716892215"
},
{
"filterName": "severity",
"operator": "=",
"value": "0,1,2,3,4"
}
],
"tool": "vulndetails",
"type": "vuln"
},
"sourceType": "cumulative",
"type": "vuln",
"startOffset": "0",
"endOffset": "100"
}
Sample Response:
{
"type": "regular",
"response": {
"totalRecords": "1474560",
"returnedRecords": 50,
"startOffset": "0",
"endOffset": "50",
"matchingDataElementCount": "-1",
"results": [
{
"pluginID": "145570",
"severity": {
"id": "3",
"name": "High",
"description": "High Severity"
},
"hasBeenMitigated": "0",
"acceptRisk": "0",
"recastRisk": "0",
"ip": "0.0.137.85",
"uuid": "11060ddf-bf0c-44a3-a240-09b0fe187433",
"port": "0",
"protocol": "TCP",
"pluginName": "CentOS 8 : sudo (CESA-2021:0218)",
"firstSeen": "1685505909",
"lastSeen": "1716537289",
"exploitAvailable": "Yes",
"exploitEase": "Exploits are available",
"exploitFrameworks": "Canvas (CANVAS), Metasploit (Sudo Heap-Based Buffer Overflow), Core Impact, malware",
"synopsis": "The remote CentOS host is missing a security update.",
"description": "The remote CentOS Linux 8 host has a package installed that is affected by a vulnerability as referenced in the CESA-2021:0218 advisory.\n\n - sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.",
"solution": "Update the affected sudo package.",
"seeAlso": "https://access.redhat.com/errata/RHSA-2021:0218",
"riskFactor": "High",
"stigSeverity": "I",
"vprScore": "9.7",
"vprContext": "[{\"id\":\"age_of_vuln\",\"name\":\"Vulnerability Age\",\"type\":\"string\",\"value\":\"730 days +\"},{\"id\":\"cvssV3_impactScore\",\"name\":\"CVSS v3 Impact Score\",\"type\":\"number\",\"value\":5.9},{\"id\":\"exploit_code_maturity\",\"name\":\"Exploit Code Maturity\",\"type\":\"string\",\"value\":\"High\"},{\"id\":\"product_coverage\",\"name\":\"Product Coverage\",\"type\":\"string\",\"value\":\"Very High\"},{\"id\":\"threat_intensity_last_28\",\"name\":\"Threat Intensity\",\"type\":\"string\",\"value\":\"Very Low\"},{\"id\":\"threat_recency\",\"name\":\"Threat Recency\",\"type\":\"string\",\"value\":\"No recorded events\"},{\"id\":\"threat_sources_last_28\",\"name\":\"Threat Sources\",\"type\":\"string\",\"value\":\"Security Research\"}]",
"baseScore": "7.2",
"temporalScore": "6.3",
"cvssVector": "AV:L/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C",
"cvssV3BaseScore": "7.8",
"cvssV3TemporalScore": "7.5",
"cvssV3Vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C",
"cpe": "cpe:/o:centos:centos:8<br/>cpe:/o:centos:centos:8-stream<br/>p-cpe:/a:centos:centos:sudo",
"vulnPubDate": "1611576000",
"patchPubDate": "1611662400",
"pluginPubDate": "1611921600",
"pluginModDate": "1674043200",
"checkType": "local",
"version": "1.11",
"cve": "CVE-2021-3156",
"bid": "",
"xref": "RHSA #2021:0218,IAVA #2021-A-0053,CISA-KNOWN-EXPLOITED #2022/04/27",
"seolDate": "-1",
"pluginText": "<plugin_output>\nRemote package installed : sudo-1.8.25p1-4.el8\nShould be : sudo-1.8.29-6.el8_3.1\n\n</plugin_output>",
"dnsName": "",
"macAddress": "00:00:00:7e:3e:0f",
"netbiosName": "",
"operatingSystem": "Linux Kernel 4.18.0-80.11.2.el8_0.x86_64 on CentOS Linux release 8.0.1905 (Core)",
"ips": "0.0.137.85",
"recastRiskRuleComment": "",
"acceptRiskRuleComment": "",
"hostUniqueness": "repositoryID,ip,dnsName",
"hostUUID": "",
"acrScore": "4.0",
"keyDrivers": "{\"internet exposure\":\"internal\",\"device capability\":\"\",\"device type\":\"general_purpose\"}",
"assetExposureScore": "619",
"vulnUniqueness": "repositoryID,ip,port,protocol,pluginID",
"vulnUUID": "",
"uniqueness": "repositoryID,ip,dnsName",
"family": {
"id": "18",
"name": "CentOS Local Security Checks",
"type": "active"
},
"repository": {
"id": "2",
"name": "Staged-Large",
"description": "",
"dataFormat": "IPv4"
},
"pluginInfo": "145570 (0/6) CentOS 8 : sudo (CESA-2021:0218)"
}
]
},
"error_code": 0,
"error_msg": "",
"warnings": [],
"timestamp": 1716810557
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.pluginName |
Vulnerability Value | N/A | pluginPubDate |
CentOS 8 : sudo (CESA-2021:0218) |
N/A |
.synopsis +.description +.solution +.pluginText |
Vulnerability Description | N/A | pluginPubDate |
The remote CentOS host is missing a security update.... |
.pluginText is User-configurable. |
.cve |
Related Vulnerability/ Related Indicator | N/A | pluginPubDate |
CVE-2021-3156 |
Value is split by ",". Object type is based on Ingest CVEs As.. selection |
.riskFactor |
Vulnerability Attribute | Risk Factor | pluginPubDate |
High |
Updatable. |
.vprScore |
Vulnerability Attribute | Vulnerability Priority Rating | pluginPubDate |
9.7 |
Updatable. |
.baseScore |
Vulnerability Attribute | CVSS v2 Base Score | pluginPubDate |
7.2 |
Updatable. |
.cvssV3BaseScore |
Vulnerability Attribute | CVSS v3 Base Score | pluginPubDate |
7.8 |
Updatable. |
.temporalScore |
Vulnerability Attribute | CVSS v2 Temporal Score | pluginPubDate |
7.5 |
Updatable. |
.severity.name |
Vulnerability Attribute | Severity | pluginPubDate |
High |
Updatable. |
.cvssVector |
Vulnerability Attribute | CVSS v2 Vector | pluginPubDate |
AV:L/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C |
N/A |
.cvssV3Vector |
Vulnerability Attribute | CVSS v3 Vector | pluginPubDate |
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C |
N/A |
.firstSeen |
Vulnerability Attribute | First Seen | pluginPubDate |
1685505909 |
Timestamp formatted. Updatable |
.lastSeen |
Vulnerability Attribute | Last Seen | pluginPubDate |
1716537289 |
Timestamp formatted. Updatable |
.pluginModDate |
Vulnerability Attribute | Last Modified | pluginPubDate |
1674043200 |
Timestamp formatted. Updatable |
.pluginInfo |
Vulnerability Attribute | Plugin Information | pluginPubDate |
145570 (0/6) CentOS 8 : sudo (CESA-2021:0218) |
N/A |
.pluginID |
Vulnerability Attribute | Plugin ID | pluginPubDate |
145570 |
N/A |
.family.name |
Vulnerability Attribute | Family | pluginPubDate |
CentOS Local Security Checks |
N/A |
.version |
Vulnerability Attribute | Version | pluginPubDate |
1.11 |
N/A |
.checkType |
Vulnerability Attribute | Type | pluginPubDate |
local |
Updatable. |
.patchPubDate |
Vulnerability Attribute | Patch Published Date | pluginPubDate |
1611662400 |
Timestamp formatted. Updatable. |
.exploitAvailable |
Vulnerability Attribute | Exploit Available | pluginPubDate |
Yes |
N/A |
.exploitEase |
Vulnerability Attribute | Exploitability Ease | pluginPubDate |
Exploits are available |
N/A |
.vulnPubDate |
Vulnerability Attribute | Vulnerability Publish Date | pluginPubDate |
1611576000 |
If value is grated than 0. Timestamp formatted. Updatable. |
.cpe |
Vulnerability Attribute | CPE | pluginPubDate |
cpe:/o:centos:centos:8<br/>cpe:/o:centos:centos:8-stream<br/>p-cpe:/a:centos:centos:sudo |
N/A |
.repository.name |
Vulnerability Attribute | Repository | pluginPubDate |
Staged-Large |
User-configurable. |
.xref |
Vulnerability Attribute | Cross-Reference | pluginPubDate |
RHSA #2021:0218 |
User-configurable. |
.seeAlso |
Vulnerability Attribute | See Also Link | pluginPubDate |
https://access.redhat.com/errata/RHSA-2021:0218 |
User-configurable. |
Get Tenable.sc IP Assets (Supplemental)
The Get Tenable.sc IP Assets supplemental feed collects IP Address Assets from Tenable.sc from a specific historical period.
GET {host}/rest/analysis
Sample Request:
{
"type": "vuln",
"sourceType": "cumulative",
"query": {
"tool": "vulnipdetail",
"type": "vuln",
"filters": [
{
"filterName": "lastSeen",
"operator": "=",
"value": "1716368655-1716455055"
}
],
"startOffset": 0,
"endOffset": 100
}
}
Sample Response:
{
"type": "regular",
"response": {
"totalRecords": "1321",
"returnedRecords": 50,
"startOffset": "0",
"endOffset": "50",
"matchingDataElementCount": "4374",
"results": [
{
"pluginID": "10107",
"total": "14",
"severity": {
"id": "0",
"name": "Info",
"description": "Informative"
},
"name": "HTTP Server Type and Version",
"pluginDescription": "This plugin attempts to determine the type and the version of the remote web server.",
"hosts": [
{
"iplist": [
{
"ip": "10.238.64.1",
"uuid": "",
"hostUUID": "",
"macAddress": "00:16:3e:a1:12:f7",
"netbiosName": "",
"dnsName": "_gateway.incus",
"acrScore": "6.0",
"assetExposureScore": "497"
}
],
"repository": {
"id": "1",
"name": "Live",
"description": "",
"dataFormat": "IPv4"
}
}
],
"family": {
"id": "11",
"name": "Web Servers",
"type": "active"
}
}
],
"error_code": 0,
"error_msg": "",
"warnings": [],
"timestamp": 1716897653
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.name |
Vulnerability Value | N/A | N/A |
HTTP Server Type and Version |
N/A |
.hosts.iplist.ip |
Related Asset Value | N/A | N/A |
10.238.64.1 |
N/A |
.hosts.iplist.netbiosName |
Related Asset Attribute | NetBIOS Name | N/A |
N/A | N/A |
.hosts.iplist.dnsName |
Related Asset Attribute | DNS | N/A |
_gateway.incus |
N/A |
.hosts.iplist.macAddress |
Asset Attribute | MAC Address | N/A |
00:16:3e:a1:12:f7 |
N/A |
Get Tenable.sc CVEs (Supplemental)
The Get Tenable.sc CVEs supplemental feed collects CVEs from Tenable.sc and ingests them into ThreatQ as Vulnerabilities or Indicators, based on user selection.
GET {host}/rest/analysis
Sample Request:
{
"type": "vuln",
"sourceType": "cumulative",
"query": {
"tool": "cveipdetail",
"type": "vuln",
"filters": [
{
"filterName": "lastSeen",
"operator": "=",
"value": "1211241600-1716336000"
}
],
"startOffset": 0,
"endOffset": 100
}
}
Sample Response:
{
"type": "regular",
"response": {
"totalRecords": "788",
"returnedRecords": 788,
"startOffset": "0",
"endOffset": "1000",
"matchingDataElementCount": "788",
"results": [
{
"cveID": "CVE-1999-0524",
"total": "52",
"hosts": [
{
"repositoryID": "1",
"iplist": [
{
"ip": "10.238.64.1",
"uuid": "",
"hostUUID": "",
"macAddress": "00:16:3e:a1:12:f7",
"netbiosName": "",
"dnsName": "_gateway.incus"
}
]
}
]
}
],
},
"error_code": 0,
"error_msg": "",
"warnings": [],
"timestamp": 1716894002
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.cveID |
Vulnerability Value | N/A | N/A |
CVE-1999-0524 |
N/A |
.hosts.iplist.ip |
Related Asset Value | N/A | N/A |
10.238.64.1 |
N/A |
.hosts.iplist.netbiosName |
Related Asset Attribute | NetBIOS Name | N/A |
N/A | N/A |
.hosts.iplist.dnsName |
Related Asset Attribute | DNS | N/A |
_gateway.incus |
N/A |
.hosts.iplist.macAddress |
Asset Attribute | MAC Address | N/A |
00:16:3e:a1:12:f7 |
N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Metric | Result |
---|---|
Run Time | 2 min |
Assets | 28 |
Asset Attributes | 57 |
Indicators | 100 |
Vulnerabilities | 114 |
Vulnerability Attributes | 668 |
Known Issues / Limitations
-
The initial run of the feed will retrieve data last discovered today. Because of the way the historical filtering is done, the minimum time interval of the requests is 1 day. ThreatQuotient advises scheduling the feed for a minimum of 24 hours.
Change Log
- Version 1.1.0
- Added update rules for the
First Seen
andLast Seen
attributes. - Added the following configuration parameter:
- Context Filter - select one or more pieces of context, such as
Cross-Reference
andSee Also Link
, to bring into ThreatQ with the vulnerability.
- Context Filter - select one or more pieces of context, such as
- Added update rules for the
- Version 1.0.1
- Added two new configuration options:
- Enable SSL Verification
- Disable Proxies
- Added two new configuration options:
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Tenable.sc CDF Guide v1.1.0 | 5.29.0 or Greater |
Tenable.sc CDF Guide v1.0.1 | 5.29.0 or Greater |
Tenable.sc CDF Guide v1.0.0 | 5.29.0 or Greater |