Vulnerabilities in Chariot
In Chariot, vulnerabilities (or "risks") are security weaknesses or issues that have been identified in an asset (domain, IP, server, etc.) during scanning. The system categorizes these vulnerabilities by severity levels and tracks them through a remediation workflow.
Severity Levels
Vulnerabilities in Chariot are classified into five severity levels (from risk.go
):
- Critical: Highest severity issues requiring immediate attention
- High: Serious vulnerabilities that should be addressed quickly
- Medium: Moderate severity issues
- Low: Minor vulnerabilities with limited impact
- Info: Informational findings that may not require remediation
Complete Vulnerability Workflow
Primary Remediation Path:
- Triage: Initial discovery and classification with severity level
- Open: Validated vulnerability that needs to be addressed
- Closed: Vulnerability that has been remediated and verified as fixed
Rejection Path:
- Triage: Initial discovery and classification
-
Rejected: A vulnerability that is valid in technical terms, but either:
- Is out of scope for the current assessment
- Has been determined by expert security engineers to not be associated with the customer's actual attack surface
Risk Acceptance Path:
- Triage: Initial discovery and classification
- Open: Validation that the vulnerability is real and associated with the customer's attack surface
-
Accepted: A deliberate decision has been made to accept the risk posed by the vulnerability rather than remediating it
- This might be due to business constraints, limited impact, compensating controls, operational requirements, or other risk management considerations
Each status is combined with severity indicators (Critical, High, Medium, Low, Info) to represent both the state and priority of the vulnerability, providing a complete picture for vulnerability management.
-
Documentation: Each vulnerability includes details such as:
- Description of the issue
- Proof of exploitation
- Associated CVEs (when applicable)
- CVSS scores
- Integration with Ticketing: Vulnerabilities can be linked to external ticketing systems like Jira for tracking remediation efforts
The system maintains a comprehensive history of status changes for each vulnerability, including who made changes and when they occurred, providing a complete audit trail for compliance and reporting purposes.
Vulnerability Retention
Chariot handles vulnerability retention in several ways:
-
TTL (Time-To-Live) mechanism:
- Vulnerabilities in triage status have a default TTL value set to 7 days
- When a vulnerability changes from triage to another status, the TTL is reset, meaning it no longer expires
- This suggests triage findings expire after a week if not acted upon, while confirmed vulnerabilities persist indefinitely until explicitly closed
-
Persistence of confirmed vulnerabilities:
- Once vulnerabilities move to
Open
,Accepted
, or other non-triage states, they remain in the system until explicitly changed - Historical data is maintained for audit and compliance purposes
- The system tracks all status changes, when they occurred, and who made them, creating a complete audit trail
- Once vulnerabilities move to
Regular rescanning of open risks:
- Open vulnerabilities are rescanned 4 times a day at: 12:30, 15:30, 18:30, and 21:30 UTC
- This ensures that the status of known vulnerabilities is kept up-to-date
Vulnerabilities Page Overview
Welcome to the vulnerabilities page - your central hub for tracking and managing security risks across your assets. This page provides a comprehensive view of discovered vulnerabilities and their current status.
At the heart of the page is an interactive table displaying all identified vulnerabilities. Each entry provides essential information including severity (ranging from info to critical), current status (pending triage, open, remediated, accepted, or rejected), the specific vulnerability name, affected asset, and the most recent confirmation date. For our managed service customers, you can rest assured that each listed vulnerability has undergone thorough review by our expert engineers.
The table offers flexible filtering options to help you focus on what matters most. You can filter vulnerabilities by severity level, status, or both. When analyzing your security posture, you can select multiple severity levels to get aggregate counts of vulnerabilities matching your criteria.
Diving deeper into individual vulnerabilities is just a click away.
Each entry expands to reveal detailed information across several tabs:
Overview Tab
This is your starting point for understanding the vulnerability. Here you'll find fundamental information about the risk, its potential impact on your systems, and guidance for remediation.
Assets Impacted Tab
Get visibility into the scope of the vulnerability. This tab is particularly useful for domain-level risks where multiple IP addresses might be affected.
Evidence Tab
Access technical data supporting the vulnerability finding. The below fields offer rich information about the vulnerability. Each vulnerability shows only the fields pertinent to its specific type and discovery method, so some sections may appear blank when they don't apply to that particular finding.
History Tab
Track the lifecycle of the vulnerability through a chronological log of actions. See status changes, who made them, and when they occurred.
Notes Tab
Collaborate with your team by adding and viewing notes. Each note entry includes the author and timestamp for clear communication history.
Need help or have questions? Our support team is ready to assist at support@praetorian.com. We're here to help you make the most of these vulnerability management capabilities.