Reviewing Exploitable Vulnerabilities
FortiRecon’s Exposure Analysis Platform (EAP) identifies and confirms exploitable vulnerabilities in your environment. It transforms theoretical CVE alerts into evidence-backed results by validating risks against live infrastructure.
When an EASM scan completes, the EAP identifies Critical and High severity issues and attempts to exploit the associated CVEs. This exploitation analysis focuses exclusively on Vulnerable Software CVEs, as most real-world attacks target software vulnerabilities.
To review the exploitable vulnerabilities:
-
Go to Attack Surface Management > Security Issues. Choose IASM using toggle, the respective security issues are displayed.
-
Click the count next to Exploitable in the Issues bar at the top to filter the exploited security issues.
-
Click a CVE ID to view its details.
For confirmed exploits, FortiRecon provides the following details to assist in remediation.
-
Tags: The following tags are displayed in the security issues list and details page.
-
Ransomware Campaigns: Indicates if the CVE was used in ransomware attacks within the last 30 days. Also, ransomware name associated with the activity is displayed.
-
CISA KEV: Indicates if the vulnerability is on the CISA Known Exploited Vulnerabilities catalog.
-
Public POCs: Indicates that the exploit was confirmed using publicly available source code such as GitHub or Exploit-DB. A link to the specific repository or entry is provided
-
Exploitability Confirmed: This tag appears for an asset in the selected security issues details page when the platform successfully executes a template and captures an HTTP response that matches an exploitation pattern.
-
-
Proof of Exploit: The Exploit Details tab displays the proof of exploit, this includes the full HTTP request and response. You can also view an HTML preview of the response (without CSS).