Get Asset Vulnerability Solutions
Returns the highest-superceding rollup solutions for a vulnerability on an asset. The solution(s) selected will be the most recent and cost-effective means by which the vulnerability can be remediated.
External Documentation
To learn more, visit the Rapid7 documentation.
Parameters
Parameter | Description |
---|---|
Asset ID | The ID of the asset. |
Disable SSL Enforcement | Enable this option to skip SSL verification of the server's certificatechain and host name. This may increase security vulnerabilities, but can be usefulfor testing or when custom verification is employed. |
Vulnerability ID | The ID of the vulnerability. |
Example Output
{
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"resources": [
{
"additionalInformation": {
"html": "",
"text": ""
},
"appliesTo": "libexpat1 on Ubuntu Linux",
"confidence": "",
"estimate": "PT10M",
"id": "ubuntu-upgrade-libexpat1",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"matches": [
{
"check": "",
"confidence": "",
"fingerprint": {
"description": "Ubuntu libexpat1 2.1.0-4ubuntu1.2",
"family": "",
"product": "libexpat1",
"vendor": "Ubuntu",
"version": "2.1.0-4ubuntu1.2"
},
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"solution": "ubuntu-upgrade-libexpat1",
"type": "software"
}
],
"steps": {
"html": "\u003cp\u003e\n Use `apt-get upgrade` to upgrade libexpat1 to the latest version.\n \u003c/p\u003e",
"text": "Use `apt-get upgrade` to upgrade libexpat1 to the latest version."
},
"summary": {
"html": "Upgrade libexpat1",
"text": "Upgrade libexpat1"
},
"type": "configuration"
}
]
}
Workflow Library Example
Get Asset Vulnerability Solutions with Rapid7 and Send Results Via Email
Preview this Workflow on desktop