Skip to Content

Feb 10, 2021

This release includes Microsoft Patch Tuesday coverage for February 2021, adds new recurring coverage for VMware, and fixes several issues.

New

  • Microsoft Patch Tuesday coverage: This release includes updated scan coverage for February 2021.

Customer Requested

  • New automated vulnerability content: We now support recurring vulnerability coverage for VMware Workspace One Access on Linux assets. This content specifically includes coverage for VMSA-2020-0027 (CVE-2020-4006), a command injection vulnerability affecting several VMware products.
  • Better license usage visibility in Administration: The Licensing tab on the Security Console Configuration page (accessed through Administration > Global and Console Settings > Administer) will now display the same license usage figure that’s already shown on the Assets page.

Customer Requested

  • New SSH host key support for the Scan Engine: The Scan Engine now supports the rsa-sha2-256 and rsa-sha2-512 SSH host key algorithms.

Improved

Customer Requested

  • Updated Microsoft SQL Server policy: We updated our Center for Internet Security (CIS) Microsoft SQL Server 2012 policy to version 1.6.0.

Fixed

  • We fixed an issue that caused the data in goals to appear inconsistent for users with Global Administrator privileges.
  • We fixed an issue that caused vulnerability exception review windows to appear with inaccurate Exception Scope and Reason fields.
  • We fixed an issue that prevented users from copying certain DISA benchmarks in the Security Console’s Policy Manager.
  • We fixed an issue with the fact_asset_vulnerability_age view in the Reporting Data Model where data retention settings in the Security Console could inadvertently skew the calculation of a vulnerability’s age.
  • We updated our checks for CVE-2017-5754 and CVE-2017-5715 to resolve false positives on Microsoft Windows operating systems.
  • We updated our checks for Cisco IOS to account for hardware models in order to reduce false positive results.