Vulnerabilities
Default ThreatQ Role: Administrative, Maintenance, or Primary Contributor
Custom Role - Action Permissions: Objects & Context - Objects, Individual Object Context & Actions
Note: If a user has View Only permission for Sources, system object creation modals default to the user’s login as the object source.
A Vulnerability, as its name suggests, is a vulnerability in an application that can be exploited to infiltrate systems/networks.
Use the steps below to create, edit and delete a Vulnerability.
Adding a Vulnerability
- Go to Create > Vulnerability.
The Add Vulnerability dialog box opens.
- Populate the following fields:
Field Description Name Add a vulnerability name. Description Enter a brief description of the vulnerability. Any description you add during object creation defaults to a Source value of ThreatQ System.
Status Optional field. Click the Status field to assign a status to the vulnerability. Vulnerability statuses are configured in the Object Statuses tab in the Object Management page. If none are configured, this field is not displayed.
Point of Contact Optional field. Click the field to select the ThreatQ display name of the point of contact for the vulnerability. Source Select a Source from the dropdown list provided. You can also click the Add a New Source option if the desired source is not listed in the drop-down list. If administrators have enabled TLP view settings, you can select a TLP label for the new source in the dropdown list provided. See the Traffic Light Protocol (TLP) topic for more information on TLP schema. - Select any Related Objects you need to link to the vulnerability. This field is optional.
- Click Add Vulnerability.
Adding Context
See the About Object Details section and its topics for details on adding context to an object such as adding sources, attributes, and related objects.
Editing a Vulnerability
- Locate and click on the Vulnerability.
The Vulnerability's detail page opens.
- Click on Edit next to the Vulnerability's name.
The Edit Vulnerability dialog box opens.
- Make the desired change to the Vulnerability name and click Save Vulnerability.
Changing the Point of Contact
Default ThreatQ Role: Administrative, Maintenance, or Primary Contributor
Custom Role - Action Permissions: Objects & Context - Objects, Individual Object Context & Actions - Point of Contact
- Locate and click the system object.
- From the object details page, click the Point of Contact field.
- Use the field's scroll or search option to locate and select a new user as the object's point of contact or to change the point of contact to Unassigned.
Deleting a Vulnerability
- Locate and click on the Vulnerability.
The Vulnerability's details page opens.
- Click on the Actions menu and select Delete Vulnerability.
A confirmation dialog box appears.
- Click on Delete Vulnerability.