Vulnerabilities

After running a scan, you can view and review the vulnerabilities that were detected in your application.

Click on Vulnerabilities in the left menu bar to view a list of all vulnerabilities that have been found in an application system. Vulnerabilities one

Sorting Vulnerabilities

Eureka offers a way for you to sort your vulnerabilities through a multiple columns system.

  1. Click Sort to open the drop-down menu. Sort one

  2. Choose the column you want to sort by from the list. Sort two

  3. The table will automatically update, organizing the rows based on your selection. Sort three

  4. To apply a secondary sort, select another column from the drop-down menu. Sort four

  5. The table will refresh again, sorting the rows by the second column while maintaining the previous sort order. Sort five

Grouping Vulnerabilities

You can group their vulnerabilities through hierarchical grouping. You can click on a column value to group the table by that category. When a second value from another column is clicked, the table further sub-groups the existing groups using the second category.

  1. To group vulnerabilities, you must first click the Group dropdown menu at the top of the Vulnerabilities table. Group one

  2. You can then select a category to group the vulnerabilities by Group two

  3. You should then see that their vulnerabiliites have been grouped by systems should they open the tab Group three Group four

  4. By selecting a second category, the vulnerabilities are further grouped into sub-groups Group five Group six

  5. In this example, by opening up the tabs, the vulnerabilites at the end of each of these tabs are grouped by a the components within a system Group seven Group eight Group nine

  6. To undo the grouping, simply click the Group button Group ten

Adding New Vulnerabilities Manually

To manually add a new vulnerability that was found by a user, follow these steps:

  1. To add a vulnerability, click Create New on the top right. add new vuln

  2. Enter the title of the vulnerability, its severity level, and the level of confidence you have in this finding. Specify which component of your system the vulnerability applies to, and the profile for the environment if was found in. If the vulnerability was found by someone other than the user currently logged in to Eureka, select who found it using the “Found By” drop-down menu. If it was found in a particular file or endpoint, add this to the ”Path” field; if it was found in a particular dependency, add this to the “Dependency Path” field. The default status is set to “New”, indicating an open/active vulnerability. If the user determines that the vulnerability does not fall under this category, they can select a different status from the “Status” dropdown menu.

    Enter additional information about this vulnerability, such as when it was first detected or what programming language its code is in, using the other fields. Click the “Edit” buttons to add a description or enter specific remediation steps that for fixing the issue. Adding new vulnerabilities manually two

  3. Additionally, you can relate this vulnerability to a specific stage in a multi-stage attack or threat using the “Attack Stages” drop-down menu. Adding new vulnerabilities manually three

  4. You can also select specific ASVS requirements that this vulnerability violates. Adding new vulnerabilities manually four

  5. Click “Save” to save the new vulnerability. Adding new vulnerabilities manually five

Vulnerability Status Management

Ignoring Vulnerabilities

If a vulnerability does not need to be fixed right away, you can ignore it either for a set period of time or indefinitely. When a vulnerability is ignored, it is excluded by default from the dashboard charts and Vulnerability List view in Eureka Portal. If the Eureka Agent runs with enforced scanners, it will not report a vulnerable scan status or block a pipeline because ignored vulnerabilities are detected.

  1. To ignore a vulnerability, select the vulnerabiliites in the list which you want ignored.

  2. Then click Bulk Actions.

  3. Then click Ignore.

  4. When ignoring vulnerabilities, you have two options:

  • You can temporarily ignore vulnerabilities by specifying a date until which they should remain ignored. This gives developers time to address these issues while ensuring that an alert is triggered after a specific date if the vulnerability is not fixed within the allocated period.
  • If a vulnerability does not need to ever be fixed, you can select the “Ignore Indefinitely” option. This is useful in cases where the vulnerability is determined to be a false positive or if it poses only an informational or low risk level.

Changing the Status of a Vulnerability

In addition to ignoring or unignoring a vulnerability, you can also update its status. Depending on the vulnerability’s progress, there are several status options to choose from. When a vulnerability is first detected by the scanner, its status is set to “New” by default. You can choose from several other statuses to better reflect the vulnerability’s handling process:

Change status

Risk Exception: A temporary exception is being requested for the risk posed by this vulnerability, but it will eventually be addressed.

False Positive: This vulnerability was reported in error and does not pose any actual risk to the system.

Other Mitigation: The issue does not need to be directly addressed, because other security controls within the system prevent it from being exploited.

Risk Accepted: Despite this issue posing some risk, your security decision makers have decided it does not need to be fixed.

Fixed: The issue has been resolved, e.g. the vulnerable dependency has been removed or the vulnerable lines of code have been changed to fix the issue. If Eureka no longer detects a vulnerability that was reported in a previous scan, the status for that vulnerability is automatically updated to “Fixed”. However, users can also manually set a vulnerability status to “Fixed” if necessary. Vulnerabilities with “Fixed” status are excluded by default from the dashboard charts and the Vulnerability List view.