Feb 10, 2021
This release includes Microsoft Patch Tuesday coverage for February 2021, adds new recurring coverage for VMware, and fixes several issues.
New
- Microsoft Patch Tuesday coverage: This release includes updated scan coverage for February 2021.
Customer Requested
- New automated vulnerability content: We now support recurring vulnerability coverage for VMware Workspace One Access on Linux assets. This content specifically includes coverage for VMSA-2020-0027 (CVE-2020-4006), a command injection vulnerability affecting several VMware products.
- Better license usage visibility in Administration: The Licensing tab on the Security Console Configuration page (accessed through Administration > Global and Console Settings > Administer) will now display the same license usage figure that’s already shown on the Assets page.
Customer Requested
- New SSH host key support for the Scan Engine: The Scan Engine now supports the
rsa-sha2-256
andrsa-sha2-512
SSH host key algorithms.
Improved
Customer Requested
- Updated Microsoft SQL Server policy: We updated our Center for Internet Security (CIS) Microsoft SQL Server 2012 policy to version 1.6.0.
Fixed
- We fixed an issue that caused the data in goals to appear inconsistent for users with Global Administrator privileges.
- We fixed an issue that caused vulnerability exception review windows to appear with inaccurate Exception Scope and Reason fields.
- We fixed an issue that prevented users from copying certain DISA benchmarks in the Security Console’s Policy Manager.
- We fixed an issue with the
fact_asset_vulnerability_age
view in the Reporting Data Model where data retention settings in the Security Console could inadvertently skew the calculation of a vulnerability’s age. - We updated our checks for CVE-2017-5754 and CVE-2017-5715 to resolve false positives on Microsoft Windows operating systems.
- We updated our checks for Cisco IOS to account for hardware models in order to reduce false positive results.