This feature is not Generally Available yet. You can refer to this document only if your Aqua environment is enabled with the feature, Suppression of image vulnerabilities. If you are interested to experience this, please contact Aqua Support for enabling the feature.


Vulnerability instances

Each entry (row) of the Vulnerabilities section of the Aqua UI is an instance of a vulnerability found during one image during scanning of the image. Therefore, if a given vulnerability was found in N images, it will appear in the list N times.


We will generally use the term vulnerability to mean an instance of a vulnerability.


The screenshot below shows a Vulnerabilities screen filtered for vulnerabilities whose name contains the text string CVE-2021-44228; there were 11 instances of this same vulnerability found during scanning. Note that you can filter only in All Vulnerabilities display mode:



The row corresponding to each vulnerability contains the following information:


Column headingMeaning

Vulnerability

ID of the vulnerability found

Image

The image in which the vulnerability was found


Therefore, the Vulnerability and the Image values comprise a unique identifier of the vulnerability instance.

Severity

Severity of the vulnerability: negligible, low, medium, high, or critical

Workloads

The number of containers, based on the image, which are currently running

Namespace

The Kubernetes namespace in which the vulnerability was found

Resource

The image resource in which the vulnerability was found

Exploit Availability

A checkmark indicates the availability of an exploit in the wild

Vendor Fix

A checkmark indicates the availability of a software vendor fix for the vulnerability

QIDs

If Qualys is integrated with Aqua, this column displays the Qualys ID(s) associated with the vulnerability

vShield Status

See Vulnerability Shield (vShield) status below

Acknowledgment

See Acknowledgment status below


Vulnerability Shield (vShield) status


A Vulnerability Shield (vShield) prevents attackers from being able to exploit a specific vulnerability instance, in all containers based on the image in question. Aqua Security Research employs technology to analyze vulnerabilities and, in many cases, generate vShields for images containing that vulnerability.


Read the topic Reactive Risk Management to learn more about vShields and their role in Image Assurance.


The vShield Status column of the Vulnerabilities page can contain any of the values listed in the following table. The table also shows the corresponding status (used for filtering the list of vulnerabilities), describes the status, and explains what clicking the status icon (if present) will do.


ValuevShield StatusExplanation and available action
vShield

vShield Available

Aqua Security has generated a vShield for this vulnerability instance; it is available for you to apply it.
Click the icon to apply a vShield.
Audit (No Events)

vShield Audit

A vShield has been applied to this vulnerability instance; its Enforcement Mode is set to Audit.
The number shows the number of audit events generated by this vShield.
Click the icon to modify or delete the vShield.
Enforce (No Events)vShield EnforceA vShield has been applied to the vulnerability instance; its Enforcement Mode is set to Enforce.
The number shows the number of audit events generated by this vShield.
Click the icon to modify or delete the vShield.
(blank)No vShield

There is no vShield available currently for this vulnerability instance.

No action is available.


Suppression status

See Reactive Risk Management for an explanation of the effects of suppressing a vulnerability.


Apply and Manage Security Issue Manual Suppressions explains how to suppress a vulnerability manually. As explained in Suppression applicability, you can apply the suppression to a single instance or multiple images. In other words, suppression can apply to multiple vulnerability instances.


The Suppression column of the Vulnerabilities page shows the suppression status of the vulnerabilities which are suppressed either manually or through a suppression rule. This column can contain either of the values listed in the following table. The table also describes the status and explains what clicking the status icon (if present) will do.


ValueExplanation
SuppressThe vulnerability instance has not been suppressed.
Click the icon to Suppress the vulnerability.
3 days agoThe vulnerability instance was acknowledged N (3, in this case) days ago. This status is shown for the vulnerabilities which are suppressed either manually or through a suppression rule.
Click the icon to unsuppress (remove the suppression) the vulnerability. This action is possible only for the vulnerabilities suppressed manually.


Filter the list

When the Vulnerabilities screen is in All Vulnerabilities display mode, you can filter the list of vulnerabilities by any or all of these criteria:


Criteria setLabelFilters on
Vulnerability Details

ID or Resource

A substring of either a vulnerability ID or a resource name
Application Scope(s)Select an application scope to filter vulnerabilities detected in the images which are categorized under the selected application scope
Severity

Vulnerability severity

Exploit Availability

Whether there is an exploit in the wild for the vulnerability
Exploit Type

Remote, DoS (denial-of-service), Local, Web Apps

Note: This information is not displayed in the list of vulnerabilities.
Environment DetailsRegistry

The registry of the image containing the vulnerability

Deployment

The Kubernetes deployment of the running container(s) that are based on the image

Workloads

Whether there are any workloads running an image containing the vulnerability

NamespaceThe Kubernetes namespace of the running container(s) that are based on the image
You can select multiple namespaces to display all the vulnerabilities found in them
ClusterThe Kubernetes cluster which has the running container(s) that are based on the image
Solution DetailsVendor FixWhether a fix for the vulnerability is available from the software vendor

vShield status

See vShield status
Suppression StatusSee Suppression status
More FiltersScoreVulnerabilities having the score which exceeds or matches the score selected in this filter


You can also clear any or all of the active filters by clicking x on the icons in the Active Filters bar:



Select a vulnerability for further actions

Click an item in the Vulnerabilities list; you will see a window that provides details about the vulnerability:



One or more of the following action icons will appear at the bottom of the window, as available. Click any of the items below to see documentation on the use of the action: