Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

How Do We Grade Vulnerability Scans?

Grading vulnerability scans involves a systematic approach to assess the security posture of systems. The following steps outline the process used to evaluate vulnerabilities.

Written by Chris Zator

Updated at November 27th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Step 1: Review CVSS Scores Step 2: Analyze Vulnerability Percentage per Host Step 3: Assess Higher-Risk Vulnerabilities Risk Algorithm:

Step 1: Review CVSS Scores

  • We begin by reviewing the CVSS (Common Vulnerability Scoring System) score assigned to each identified CVE (Common Vulnerabilities and Exposures). This score helps us understand the severity of each vulnerability.

Step 2: Analyze Vulnerability Percentage per Host

  • Next, we calculate the percentage of vulnerabilities found for each host based on the total number of vulnerabilities we scan for. This analysis provides insight into how vulnerable each individual host is relative to the overall environment.

Step 3: Assess Higher-Risk Vulnerabilities

  • Finally, we focus on the number of vulnerabilities that have a CVSS score of 4 or above. These scores indicate vulnerabilities that pose a moderate to high risk and require immediate attention.

Risk Algorithm:

  • We take all these elements—CVSS scores, percentage of vulnerabilities per host, and the count of higher-risk vulnerabilities—and input them into our risk algorithm. This algorithm generates a comprehensive grading system for the vulnerability scan, allowing us to prioritize remediation efforts effectively.

 

 

 

 

security assessing scans vulnerability grading

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Setup MFA (Multi-Factor Authentication)
  • Unable to see any instances when logging in.
  • What is the ARF File Error?
  • Where to Find Information on User Roles?
  • Where can I upload custom logo?

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand