Vulnerability Management
Tripl-i's Vulnerability Management module provides comprehensive visibility into security vulnerabilities across your IT infrastructure. By automatically correlating discovered software and operating systems with known vulnerabilities from the National Vulnerability Database (NVD), you can proactively identify and address security risks before they become threats.
Why Use Vulnerability Management?
Reduce Security Risk
- See your true exposure: Know exactly which unpatched vulnerabilities exist in your environment
- Prioritize effectively: Focus remediation efforts on critical and actively exploited vulnerabilities first
- Track progress: Monitor your security posture improvement over time with clear metrics
Save Time and Resources
- Eliminate manual tracking: Automatic correlation between software inventory and known vulnerabilities
- Reduce false positives by up to 89%: Version-aware matching ensures you only see vulnerabilities that actually affect your installed versions
- Automatic resolution: Vulnerabilities are automatically marked as resolved when software is upgraded or patched
Meet Compliance Requirements
- Audit-ready reporting: Export vulnerability data for compliance audits
- Document remediation: Track status, assignments, and resolution dates
- Evidence collection: Maintain a complete history of vulnerability discovery and remediation
Key Capabilities
Intelligent Vulnerability Detection
| Feature | Benefit |
|---|---|
| Version-Aware Matching | Only vulnerabilities affecting your exact software versions are reported |
| Patch Intelligence | Windows patches (KBs) are automatically factored in to exclude already-fixed CVEs |
| Auto-Resolution | Vulnerabilities are automatically resolved when software is upgraded or a patch is installed |
| Exploit Awareness | Actively exploited vulnerabilities are flagged for priority attention |
Complete Remediation Workflow
- Status Tracking: Move vulnerabilities through stages (Open → Acknowledged → In Progress → Resolved)
- Team Assignment: Assign vulnerabilities to team members with due dates
- Ticketing Integration: Link vulnerabilities to your ticketing system for seamless workflow
- Notes & History: Add investigation notes and maintain a complete audit trail
Module Components
The Vulnerability Management module consists of four main components:
1. Active Vulnerabilities
The central dashboard for managing vulnerabilities affecting your infrastructure. View statistics, prioritize remediation efforts, and track progress through resolution.
2. CVE Database
A comprehensive database of Common Vulnerabilities and Exposures (CVEs) synchronized from the National Vulnerability Database. Search and explore vulnerability details including severity scores, affected products, and available patches.
3. CPE Dictionary
The Common Platform Enumeration (CPE) dictionary maps software products to standardized identifiers, enabling accurate vulnerability matching across different naming conventions.
4. KB-CVE Mappings
For Windows environments, this component tracks which Microsoft Knowledge Base (KB) patches fix which CVEs, ensuring accurate exposure calculations.
How Vulnerability Detection Works
The vulnerability detection process happens automatically during discovery scans:
- Software Discovery: Network scans collect installed software and operating system information from your devices
- Product Identification: Software is matched to standardized CPE (Common Platform Enumeration) identifiers
- Vulnerability Matching: CPEs are correlated with known vulnerabilities from the NVD, checking version ranges
- Patch Filtering: Installed patches are checked against KB-CVE mappings to exclude already-fixed vulnerabilities
- Exposure Reporting: Only true, unpatched vulnerabilities are reported and tracked
Automatic Resolution
Vulnerabilities are automatically resolved when:
- Software is upgraded: If you update to a version that's no longer vulnerable
- Software is removed: If the vulnerable software is uninstalled
- Patches are applied: When a Windows KB patch that fixes the CVE is installed
Getting Started
To begin using Vulnerability Management:
- Ensure Discovery is Running: The module relies on discovery scans to collect software inventory
- Navigate to SAM > Vulnerability Management: Access the module from the main navigation
- Review Active Vulnerabilities: Start with the dashboard to understand your current exposure
- Explore the CVE Database: Research specific vulnerabilities affecting your systems
- Plan Remediation: Prioritize and assign vulnerabilities for resolution
Keeping Data Current
The vulnerability database requires regular synchronization to maintain accurate coverage.
CVE Synchronization
Use the CVE Sync Dashboard to keep vulnerability data up to date:
| Sync Mode | Purpose | When to Use |
|---|---|---|
| Microsoft KB Sync | Updates Windows patch-to-CVE mappings | Weekly (after Patch Tuesday) |
| NVD Delta Sync | Fetches CVEs modified in the last 7 days | Daily (recommended) |
| New Software Only | Enriches newly discovered software entries | After initial setup or adding new software |
| Full Sync | Complete synchronization of all modes | Initial setup or repair |
Recommended Sync Schedule
| Frequency | Sync Mode | Purpose |
|---|---|---|
| Daily | NVD Delta Sync | Catch newly disclosed and modified CVEs |
| Weekly | Microsoft KB Sync | Align with Windows Patch Tuesday updates |
| As needed | New Software Only | Enrich newly discovered applications |
| Quarterly | Full Sync | Comprehensive database refresh |
Automatic Enrichment
New software discovered during scans is automatically enriched with vulnerability data—no manual sync required for newly discovered applications.
Data Sources
Tripl-i integrates with authoritative vulnerability data sources:
| Source | Data Provided |
|---|---|
| NIST NVD | CVE details, CVSS scores, affected products, version ranges |
| Microsoft MSRC | KB-to-CVE mappings for Windows patch intelligence |
| CISA KEV | Known Exploited Vulnerabilities catalog for actively exploited threats |
| EPSS | Exploit Prediction Scoring System probabilities |
Best Practices
Prioritize Effectively
- Start with known exploits: Address vulnerabilities flagged as actively exploited first
- Focus on critical/high severity: Tackle CVSS 7.0+ vulnerabilities before lower severity issues
- Consider asset criticality: Prioritize vulnerabilities on business-critical systems
Maintain Data Quality
- Run regular syncs: Enable daily NVD Delta syncs to stay current
- Keep discovery running: Schedule regular scans to ensure software inventory is accurate
- Review after patching: Run a scan after applying patches to verify vulnerability resolution
Track Progress
- Use the workflow: Move vulnerabilities through status stages to track remediation
- Assign owners: Ensure every critical vulnerability has an assigned remediation owner
- Set due dates: Establish SLAs for vulnerability resolution based on severity
Common Questions
Why don't I see all CVEs for a software product?
Tripl-i uses version-aware matching, which means only CVEs that affect your specific installed version are shown. This eliminates false positives where a CVE might affect version 1.0-1.5, but you have version 2.0 installed.
Why did some vulnerabilities disappear after a scan?
The system uses automatic resolution. Vulnerabilities are automatically resolved when:
- Software is upgraded to a non-vulnerable version
- A Windows patch (KB) that fixes the CVE is installed
- The vulnerable software is removed
How often should I sync the CVE database?
For most environments, we recommend:
- Daily: Run NVD Delta Sync to catch newly disclosed vulnerabilities
- Weekly: Run Microsoft KB Sync after Patch Tuesday
- Full Sync: Only needed for initial setup or troubleshooting
What does "Known Exploit" mean?
Vulnerabilities flagged with "Known Exploit" have confirmed exploit code available in the wild. These should be prioritized for immediate remediation as attackers can actively leverage them.
Related Topics
- Active Vulnerabilities - Managing discovered vulnerabilities
- CVE Database - Exploring vulnerability details
- CPE Dictionary - Understanding software identification
- KB-CVE Mappings - Windows patch mapping