Vulnerability Assessment Reports Analysis


Following the completion of each step in the vulnerability assessment process, the security team will analyse the data and compile the final report by reviewing the findings. During this stage, the security team will make an effort to reveal any vulnerabilities that they have found, record any changes and discoveries, and incorporate all of this information, along with remedial measures to reduce any risks that have been found, into the final report.


The vulnerability report must cover the following elements:

  • Scan information: Provides information such as the name of the scanning tool, its version, and the network ports to be scanned.
  • Target Information: Contains information about the target system's name and address.
  • Results: Complete scanning reports containing subtopics such as target, services, vulnerability, classification, and assessment.
  • Target: Includes each host's detailed information and contains the following information:
    • <Node>: Contains the name and address of the host
    • <OS>: Shows the operating system type
    • <Date>: Gives the date of the test
  • Services: Defines the network services by their names and ports
  • Classification: Allows the system administrator to obtain additional information about the scan, such as its origin. 
  • Assessment: Provides information regarding the scanner's assessment of discovered vulnerabilities. 

The vulnerability assessment report must include, but is not limited to, the following points:
  • The vulnerability's name and its mapped CVE ID
  • The date of discovery
  • The score is based on Common Vulnerabilities and Exposures (CVE) databases
  • A detailed description of the vulnerability
  • The impact of the vulnerability
  • Details regarding the affected systems
  • Details regarding the process needed to correct the vulnerability, including information patches, configuration fixes, and ports to be blocked. 
  • A proof of concept (PoC) of the vulnerability of the system (if possible)

The vulnerability assessment reports are classified into two types:

Security Vulnerability Report

This is a combined report for all the scanned devices and servers in the organization's network. The security vulnerability report includes the following details:
  • Newly found vulnerabilities
  • Open ports are detected services
  • Suggestion for remediation
  • Links to patches

Security Vulnerability Summary

This report is produced for every device or server after scanning. It gives a summary of the scan result that includes the following elements:
  • Current security flaws
  • Categories of vulnerabilities
  • Newly detected security vulnerabilities
  • The severity of vulnerabilities
  • Resolved vulnerabilities

You might be interested in,

No comments:

Post a Comment