We’re currently experiencing a high volume of support requests, which may result in longer response times — thank you for your patience and understanding.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

This documentation is for the new preview UI. It’s still being refined and is subject to change. For documentation for the old UI, see Knowledge Base.

Article link copied to clipboard
Updated
Published
2 min read

In today's interconnected world, understanding your risk posture is crucial for maintaining the security and integrity of systems and assets. Vulnerabilities represent weaknesses that malicious actors can exploit, potentially leading to unauthorized access, data breaches, or system disruptions.

Lansweeper uses CPE correlation to identify and map vulnerabilities to specific software, hardware, OS, or firmware products in your inventory.

Common Platform Enumeration (CPE) is a standardized naming system used to uniquely identify IT products. By assigning CPE identifiers to the components discovered in your environment, Lansweeper can match known vulnerabilities from external sources to your organization's products.

This matching process is powered by VulnCheck, which provides a curated and continuously updated vulnerability database.

Common Vulnerabilities and Exposures (CVE)

CVE, which stands for Common Vulnerabilities and Exposures, is an identification system used to uniquely identify vulnerabilities. Each CVE entry corresponds to a specific vulnerability and includes relevant details such as descriptions, impacts, and potential mitigations. By referencing CVEs, security professionals, researchers, and organizations can effectively communicate and track vulnerabilities across different systems and platforms.

To enrich its vulnerability information, Lansweeper uses VulnCheck as its primary provider for vulnerability intelligence data. VulnCheck in turn leverages information from NIST (National Institute of Standards and Technology), CISA (Cybersecurity and Infrastructure Security Agency), MS (Microsoft), vendors and other databases.

These sources provide valuable insights into known vulnerabilities, their impacts, and recommended mitigation measures. By utilizing information from these databases, Lansweeper ensures that it stays up-to-date with the latest vulnerabilities and security advisories.

Lansweeper's Risk insights may not display certain known vulnerabilities. As our CVE information is sourced from VulnCheck, vulnerabilities currently under analysis by VulnCheck will not be visible.