Get Asset Vulnerability Solutions
Returns the highest-superceding rollup solutions for a vulnerability on an asset. The solution(s) selected will be the most recent and cost-effective means by which the vulnerability can be remediated.
External Documentation
To learn more, visit the Rapid7 documentation.
Parameters
Parameter | Description |
---|---|
Asset ID | The ID of the asset. |
Disable SSL Enforcement | Enable this option to skip SSL verification of the server's certificate chain and host name. This may increase security vulnerabilities, but can be useful for testing or when custom verification is employed. |
Vulnerability ID | The ID of the vulnerability. |
Example Output
{
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"resources": [
{
"additionalInformation": {
"html": "",
"text": ""
},
"appliesTo": "libexpat1 on Ubuntu Linux",
"confidence": "",
"estimate": "PT10M",
"id": "ubuntu-upgrade-libexpat1",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"matches": [
{
"check": "",
"confidence": "",
"fingerprint": {
"description": "Ubuntu libexpat1 2.1.0-4ubuntu1.2",
"family": "",
"product": "libexpat1",
"vendor": "Ubuntu",
"version": "2.1.0-4ubuntu1.2"
},
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"solution": "ubuntu-upgrade-libexpat1",
"type": "software"
}
],
"steps": {
"html": "\u003cp\u003e\n Use `apt-get upgrade` to upgrade libexpat1 to the latest version.\n \u003c/p\u003e",
"text": "Use `apt-get upgrade` to upgrade libexpat1 to the latest version."
},
"summary": {
"html": "Upgrade libexpat1",
"text": "Upgrade libexpat1"
},
"type": "configuration"
}
]
}
Workflow Library Example
Get Asset Vulnerability Solutions with Rapid7 and Send Results Via Email
Preview this Workflow on desktop