Apr 28, 2021
This release includes a better custom vulnerability check loading process, policy updates, and several fixes.
New
Customer Requested
- New custom vulnerability check functionality: The Security Console will now automatically load custom vulnerability checks on whichever Scan Engine is in use when the scan starts.
Improved
- Updated Center for Internet Security (CIS) policies: We updated the following CIS policies:
- Ubuntu Linux 16.04 LTS, version 2.0.0
- Kubernetes, version 1.6.1
- Improved policy assessment performance: Our Windows privilege enumeration process for policy assessments is now more efficient.
Fixed
- Our Java fingerprinting process now better handles version numbers that contain dashes (
-
) or underscores (_
). This change reduces the likelihood of false positives associated with Java versions that contain these characters. - We fixed an issue that prevented AWS assets which required pre-scan verification from being scanned when a blackout was overridden.
- We fixed an issue that prevented asset detail pages from consistently displaying all discovered services from the last scan.
- We fixed an issue that prevented scans from starting if the site scope included any assets that had an alternate MAC address that was not associated with an IP address.
- We fixed an issue that prevented Nexpose from retrieving CyberArk credentials when a scan was paused and then resumed.
- We fixed an issue that caused vulnerability scans to utilize excessive memory when scanning Windows Domain Controllers.
- We fixed an issue with CIS Windows benchmarks where the rule “Ensure ‘Network access: Allow anonymous SID/Name translation’ is set to ‘Disabled’” could give incorrect results due to case sensitivity.
- We updated our fingerprinting for SolarWinds DameWare Mini Remote Control to reduce false negatives.
Other Changes
- The
log-time-zone set <timezone>
console command now only accepts time zones in GMT formats.