Skip to main content

Get Asset Vulnerability Solutions

Returns the highest-superceding rollup solutions for a vulnerability on an asset. The solution(s) selected will be the most recent and cost-effective means by which the vulnerability can be remediated.

External Documentation

To learn more, visit the Rapid7 documentation.

Parameters

ParameterDescription
Asset IDThe ID of the asset.
Disable SSL EnforcementEnable this option to skip SSL verification of the server's certificate
chain and host name. This may increase security vulnerabilities, but can be useful
for testing or when custom verification is employed.
Vulnerability IDThe ID of the vulnerability.

Example Output

{
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"resources": [
{
"additionalInformation": {
"html": "",
"text": ""
},
"appliesTo": "libexpat1 on Ubuntu Linux",
"confidence": "",
"estimate": "PT10M",
"id": "ubuntu-upgrade-libexpat1",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"matches": [
{
"check": "",
"confidence": "",
"fingerprint": {
"description": "Ubuntu libexpat1 2.1.0-4ubuntu1.2",
"family": "",
"product": "libexpat1",
"vendor": "Ubuntu",
"version": "2.1.0-4ubuntu1.2"
},
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"solution": "ubuntu-upgrade-libexpat1",
"type": "software"
}
],
"steps": {
"html": "\u003cp\u003e\n Use `apt-get upgrade` to upgrade libexpat1 to the latest version.\n \u003c/p\u003e",
"text": "Use `apt-get upgrade` to upgrade libexpat1 to the latest version."
},
"summary": {
"html": "Upgrade libexpat1",
"text": "Upgrade libexpat1"
},
"type": "configuration"
}
]
}

Workflow Library Example

Get Asset Vulnerability Solutions with Rapid7 and Send Results Via Email

Workflow LibraryPreview this Workflow on desktop