In the following, you'll learn how to manage remediation of entities affected by or related to a vulnerability. You can
Third-party vulnerabilities
For vulnerabilities based on the Snyk feed, a fix recommendation is displayed if one is available. It consists of a library upgrade suggestion to solve the vulnerability.
On the Prioritization page, select a vulnerability.
In the side panel, go to Details and look for Fix recommendation.
Make sure to restart processes after upgrading a library.
Third-party vulnerabilities
With Davis Security Advisor (DSA), you can determine
To filter by DSA fixes
On the Prioritization page, on the upper-left of the vulnerabilities table, select Davis Security Advisor. This opens a Davis Security Advisor side window with a list of fixes.
Select for the desired library. This filters the vulnerabilities table by the total number of vulnerabilities for a selected library that would be fixed by upgrading the library.
Make sure to restart processes after upgrading a library.
To learn more about Davis Security Advisor, see Concepts: Davis Security Advisor.
You can add links to tickets created in your issue tracking system for affected entities.
Adding a tracking link allows you to
You can easily check, for example, if someone is already working on fixing the vulnerability.
You can add, edit, or delete tracking links individually or in bulk.
On the Prioritization page, select a vulnerability.
In the side panel, go to Affected entities.
Select View all process groups (View all Kubernetes nodes) to navigate to the process group (or Kubernetes node) overview page related to the vulnerability.
You have the following options:
To add a tracking link, in the Tracking link column, select Set link for the desired entity.
To edit or delete a link, in the Tracking link column, select next to the tracking link for the desired entity, and then select Edit tracking link or Delete tracking link.
To fix vulnerabilities you need to find the root cause. You can examine
Third-party vulnerabilities
Identify which libraries contain the vulnerability and how many affected process groups (or Kubernetes nodes) are impacted.
On the Prioritization page, select a vulnerability.
In the side panel, go to Affected entities and look for Vulnerable components.
You can also view vulnerable components on the overview page of process groups or Kubernetes nodes:
On the Prioritization page, select a vulnerability.
In the side panel, go to Affected entities.
Under Process group overview (or Kubernetes node overview), either select a specific process group (or Kubernetes node), or select View all process groups (View all Kubernetes nodes) to open the related overview page.
From there, select an affected entity to view details, including the name of the vulnerable component.
Further reading
Code-level vulnerabilities
Analyze entry points to determine how the vulnerability could be exploited and identify potential attack paths.
On the Prioritization page, select a vulnerability.
In the side panel, go to Details and look for Entry points.
If the same vulnerability is reachable by multiple HTTP paths, multiple entry point entries are listed. To save memory and network traffic, a limited number of entries is displayed.
If a code-level vulnerability is resolved or is about to be resolved in the next 30 minutes, the entry points are no longer open (vulnerable).
Further reading
Code-level vulnerabilities
View the source of the vulnerable function call to quickly assess its impact and origin.
On the Prioritization page, select a vulnerability.
In the side panel, go to Details and look for Code location.
You can change the mute status of affected entities according to your findings and needs. For example, you can set the status of an affected entity to Muted (...)
if you wish to ignore the vulnerability for this particular entity:
Muting all affected entities of a vulnerability sets the vulnerability status to Muted
. For details, see Vulnerability status.
You can change the status of affected entities individually or in bulk.
On the Prioritization page, select a vulnerability.
In the side panel, go to Affected entities.
Select View all process groups (View all Kubernetes nodes) to navigate to the process group (or Kubernetes node) overview page related to the vulnerability.
In the Mute status column, select the current value for the desired entity.
Enter the new status and select Save.