Vulnerability instance inventory
When viewing vulnerability instances on assets, you can use the following keywords to search and filter information.
Vulnerability ID
The ID field is the unique identifier for a given vulnerability, written as a UUID. Use the syntax id:<uuid> to filter by the ID field.
id:a124a141-e518-4735-9878-8e89c575b1d2
Source
The source reporting the vulnerability detected can be searched or filtered by name using the syntax source:<name>.
source:tenable
Severity
The severity field can be searched using the syntax severity:<term>.
severity:info
severity:medium
Severity score
The severity score can be searched using the syntax severity_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
severity_score:<5.0
severity_score:>=9.0
Risk
The risk field can be searched using the syntax risk:<term>.
risk:none
risk:critical
Risk score
The risk score can be searched using the syntax risk_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
risk_score:>7.0
risk_score:=10.0
Modified risk
Vulnerabilities whose risk has been modified, either manually or by way of alert rule trigger has_modified_risk:<boolean>.
The term is a boolean value:
true,t,1, andyesrepresent truefalse,f,0, andnorepresent false
has_modified_risk:true
has_modified_risk:1
has_modified_risk:no
Category
The category field can be searched using the syntax category:<term>.
category:Local
category:Remote
Name
The name field can be searched using the syntax name:<term>.
name:"Cisco IOS Software DHCP Remote Code Execution Vulnerability"
name:"PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution"
Description
The description field can be searched using the syntax description:<term>.
description:"The remote device is missing a vendor-supplied security patch."
description:"remote code execution"
Solution
The solution field can be searched using the syntax solution:<term>.
solution:patch
solution:upgrade
CVE
The CVE field can be searched using the syntax cve:<term>.
cve:CVE-2021-44228
cve:CVE-2016-2183
KEV
Membership in a Known Exploited Vulnerability (KEV) list can be searched using the syntax kev:<term>.
kev:t
will search for vulnerabilities that appear on a KEV list.
Specific KEV lists can be searched by name.
-
kev:cisawill search for vulnerabilities listed as actively exploited in the CISA Known Exploited Vulnerabilities Catalog. -
kev:vulncheckwill search for vulnerabilities listed as actively exploited in the VulnCheck Catalog. -
kev:truewill search for vulnerabilities in either of the above lists.
Exploitable
Vulnerabilities that are exploitable can be searched using the syntax exploitable:<boolean>.
The term is a boolean value:
true,t,1, andyesrepresent truefalse,f,0, andnorepresent false
exploitable:true
exploitable:1
exploitable:no
CVSSv2 score
The CVSSv2 fields, cvss2_base_score and cvss2_temporal_score, can be searched using the syntax cvss2_base_score:<term> and cvss2_temporal_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
cvss2_base_score:>6.5
cvss2_base_score:<=3.0
cvss2_temporal_score:=10.0
cvss2_temporal_score:<5.0
CVSSv3 score
The CVSSv3 fields, cvss3_base_score and cvss3_temporal_score, can be searched using the syntax cvss3_base_score:<term> and cvss3_temporal_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
cvss3_base_score:>6.5
cvss3_base_score:<=3.0
cvss3_temporal_score:=10.0
cvss3_temporal_score:<5.0
EPSS score
The EPSS score can be searched using the syntax epss_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
epss_score:>0.5
epss_score:<=0.1
epss_score:=0.9
Address
The address field can be searched using the syntax address:<term>.
address:192.168.0.1
Transport
The transport field can be searched using the syntax transport:<term>.
transport:tcp
transport:udp
Port
The port can be searched using the syntax port:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).
port:22
port:443
Operating system support status
The syntax os_eol_expired:<boolean> can be used to find identify vulnerabilities on assets based on whether their operating systems are End of Life (EOL). This field evaluates both the os_eol and os_eol_extended values to only return vulnerabilities on assets with expired coverage.
The term is a boolean value:
true,t,1, andyesrepresent truefalse,f,0, andnorepresent false
os_eol_expired:t
os_eol_expired:1
os_eol_expired:no
Finding code
The finding code field is the unique identifier for a given finding. Use the syntax finding_code:<term> to filter by the code field.
finding_code:rz-finding-internet-exposed-database
Finding name
Use the syntax finding_name:<text> to search by finding name.
finding_name:"Internet Exposed Database"
Finding risk
The Finding Risk and Finding Risk Score fields can be searched using either numeric or keyword values.
Risk score is an integer from zero through four, where 0 is Info level risk and 4 indicates Critical risk.
finding_risk:"Critical"
finding_risk:2
Detection timestamps (first detected at, last detected at)
The timestamp fields, first_detected_at and last_detected_at, can be searched using the syntax first_detected_at:<term> and last_detected_at:<term>. The term supports the standard runZero [time comparison syntax][time].
first_detected_at:>2weeks
first_detected_at:<30minutes
last_detected_at:>1month
last_detected_at:2hours
Publication timestamps (published at)
The timestamp field, published_at, can be searched using the syntax published_at:<term>. The term supports the standard runZero [time comparison syntax][time].
published_at:>2weeks
published_at:<30minutes
Timestamps (created at, updated at)
The timestamp fields, created_at and updated_at, can be searched using the syntax created_at:<term> and updated_at:<term>. The term supports the standard runZero [time comparison syntax][time].
created_at:>2weeks
created_at:<30minutes
updated_at:>1month
updated_at:2hours
Attributes
You can search all vulnerability attributes with the syntax <attribute>:<term>. This search term supports numerical comparison operators (>, >=, <, <=, =).
If the attribute name conflicts with an existing term, the prefix _vulnerability. can be added to disambiguate the query.
plugin.hasPatch:true
severityID:3
_vulnerability.state:REOPENED
To determine if a vulnerability has any attribute defined, use the has:<term> keyword. The has keyword can be inverted to find missing fields with not has:<term>.
has:plugin.vpr.score
not has:output
Certificate fields
Certificate-related fields can be searched using the following keywords.
Certificate ID
Use the syntax certificate_id:<uuid> to filter by certificate ID.
certificate_id:4e3a2b1c-5d6f-7a8b-9c0d-1e2f3a4b5c6d
Certificate type
Use the syntax certificate_type:<term> to search by certificate type.
certificate_type:"x509"
Certificate serial
Use the syntax certificate_serial:<term> to search by certificate serial number.
certificate_serial:"01A23B45C"
Certificate public key
Use the syntax certificate_public_key:<term> to search by certificate public key.
certificate_public_key:"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A..."
Certificate public key algorithm
Use the syntax certificate_public_key_algorithm:<term> to search by certificate public key algorithm.
certificate_public_key_algorithm:"ecPublicKey"
Certificate signature
Use the syntax certificate_signature:<term> to search by certificate signature.
certificate_signature:"abcdef1234567890"
Certificate signature algorithm
Use the syntax certificate_signature_algorithm:<term> to search by certificate signature algorithm.
certificate_signature_algorithm:"rsaEncryption"
Certificate fingerprint (bkhash)
Use the syntax certificate_fp_bkhash:<term> to search by certificate fingerprint (bkhash).
certificate_fp_bkhash:"d2c7e8f9..."
Certificate fingerprint (SHA1)
Use the syntax certificate_fp_sha1:<term> to search by certificate SHA1 fingerprint.
certificate_fp_sha1:"349eb7db55bbad9d7deabc5effdfd5521ed984a0"
Certificate fingerprint (SHA256)
Use the syntax certificate_fp_sha256:<term> to search by certificate SHA256 fingerprint.
certificate_fp_sha256:"SHA256:Sc0pLUCvlNaGtu4Xy2fOTe1A6cC+KyU3x7xuN8+aLtA="
Certificate subject
Use the syntax certificate_subject:<term> to search by certificate subject.
certificate_subject:"CN=example.com,O=ExampleCorp,C=US"
Certificate common name (CN)
Use the syntax certificate_cn:<term> to search by certificate common name.
certificate_cn:"example.com"
Certificate issuer
Use the syntax certificate_issuer:<term> to search by certificate issuing authority.
certificate_issuer:"CN=Example CA,O=Example Corp,C=US"
Certificate subject key ID
Use the syntax certificate_subject_key_id:<term> to search by certificate subject key ID.
certificate_subject_key_id:"1234567890abcdef"
Certificate authority key ID
Use the syntax certificate_authority_key_id:<term> to search by certificate issuing authority key ID.
certificate_authority_key_id:"abcdef1234567890"