Get Vulnerability (CVEs) Stats
GET/api/v32.07/stats/vulnerabilities
x-prisma-cloud-target-env: {"permission":"monitorVuln"}
Returns a list of vulnerabilities (CVEs) in the deployed images, registry images, hosts, and serverless functions affecting your environment.
The response also includes detailed descriptions for each CVE. The data for each CVE, such as impacted packages, highest severity, and so on, is based on the entire environment irrespective of the collections filter, assigned collections, or assigned accounts.
This endpoint maps to the table in Monitor > Vulnerabilities > Vulnerability explorer in the Console UI.
You can use filters such as cvssThreshold
, severityThreshold
, or collections
as query parameters to get desired results.
Consider the following observations:
- You cannot use new filters such as severityThreshold and cvssThreshold with the collections filter or when you're assigned with specific collections or accounts.
- The impacted resources and distribution counts are not retrieved when you apply filters or you are assigned with specific collections or accounts. For example, when you apply these filters, the counts in the API
/stats/vulnerabilities
are returned as zero and empty in the API/stats/vulnerabilites/download
.
- cvssThresold: Retrieves a list of vulnerabilities (CVEs) that matches the specified value of CVSS score or higher.
- severityThreshold: Retrieves a list of vulnerabilities (CVEs) that matches the specified value of the severity threshold or higher.
- collections: Retrieves a list of vulnerabilities (CVEs) that matches the specified collection name.
cURL Request
Refer to the following example cURL command that retrieves a summary count of the CVEs and detailed descriptions for each CVE:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/json' \
-X GET \
'https://<CONSOLE>/api/v<VERSION>/stats/vulnerabilities'
cURL Response
A successful response returns a summary count of the CVEs and detailed descriptions for each CVE.
Request
Query Parameters
Offsets the result to a specific report count. Offset starts from 0.
Limit is the amount to fix.
Sorts the result using a key.
Sorts the result in reverse order.
CVE is the single CVE ID to return vulnerability data for.
SeverityThreshold is the minimum severity indicating that all retrieved CVEs severities are greater than or equal to the threshold.
CVSSThreshold is the minimum CVSS score indicating that all retrieved CVEs CVSS scores are greater than or equal to the threshold.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType is the single resource type to return vulnerability data for.
Agentless indicates whether to retrieve vulnerability data for agentless hosts/images.
Stopped indicates whether to retrieve vulnerability data for hosts that were not running during agentless scan.
Packages filter by impacted packages.
RiskFactors filter by CVE risk factors.
EnvRiskFactors filter by environmental risk factors.
Responses
- 200
- default
- application/json
- Schema
- Example (from schema)
Schema
- Array [
- Array [
- Array [
- ]
- ]
- Array [
- Array [
- ]
- ]
- Array [
- Array [
- ]
- ]
- Array [
- Array [
- ]
- ]
- Array [
- Array [
- ]
- ]
- ]
ID of the vulnerability stats.
containers object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
Count is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
impacted object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
vulnerabilities object[]
All resource vulnerabilities.
CVE ID.
Vulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Possible values: [poc,in-the-wild
]
ExploitKind represents the kind of the exploit
Link is a link to information about the exploit.
Possible values: [,exploit-db,exploit-windows,cisa-kev
]
ExploitType represents the source of an exploit
HighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
EnvVarSecrets indicates whether a container has access to secrets via environment variables.
HostAccess indicates whether a container has access to the host network or namespace.
Internet indicates whether a container has internet access.
Network indicates whether a container is listening to ports.
NoSecurityProfile indicates whether a container has security profile issue.
PrivilegedContainer indicates whether a container runs using the --privileged flag.
RootMount indicates whether a container has access to the host file system using a root mount.
RootPrivilege indicates whether a container runs as root.
RuntimeSocket indicates whether a container has the runtime socket mounted.
HighestSeverity is the highest severity of the vulnerability.
Packages impacted by the vulnerability.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType represents the resource type
Number of resources impacted by this vulnerability.
Link to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
Risk score.
CVE status.
functions object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
Count is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
impacted object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
vulnerabilities object[]
All resource vulnerabilities.
CVE ID.
Vulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Possible values: [poc,in-the-wild
]
ExploitKind represents the kind of the exploit
Link is a link to information about the exploit.
Possible values: [,exploit-db,exploit-windows,cisa-kev
]
ExploitType represents the source of an exploit
HighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
EnvVarSecrets indicates whether a container has access to secrets via environment variables.
HostAccess indicates whether a container has access to the host network or namespace.
Internet indicates whether a container has internet access.
Network indicates whether a container is listening to ports.
NoSecurityProfile indicates whether a container has security profile issue.
PrivilegedContainer indicates whether a container runs using the --privileged flag.
RootMount indicates whether a container has access to the host file system using a root mount.
RootPrivilege indicates whether a container runs as root.
RuntimeSocket indicates whether a container has the runtime socket mounted.
HighestSeverity is the highest severity of the vulnerability.
Packages impacted by the vulnerability.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType represents the resource type
Number of resources impacted by this vulnerability.
Link to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
Risk score.
CVE status.
hosts object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
Count is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
impacted object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
vulnerabilities object[]
All resource vulnerabilities.
CVE ID.
Vulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Possible values: [poc,in-the-wild
]
ExploitKind represents the kind of the exploit
Link is a link to information about the exploit.
Possible values: [,exploit-db,exploit-windows,cisa-kev
]
ExploitType represents the source of an exploit
HighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
EnvVarSecrets indicates whether a container has access to secrets via environment variables.
HostAccess indicates whether a container has access to the host network or namespace.
Internet indicates whether a container has internet access.
Network indicates whether a container is listening to ports.
NoSecurityProfile indicates whether a container has security profile issue.
PrivilegedContainer indicates whether a container runs using the --privileged flag.
RootMount indicates whether a container has access to the host file system using a root mount.
RootPrivilege indicates whether a container runs as root.
RuntimeSocket indicates whether a container has the runtime socket mounted.
HighestSeverity is the highest severity of the vulnerability.
Packages impacted by the vulnerability.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType represents the resource type
Number of resources impacted by this vulnerability.
Link to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
Risk score.
CVE status.
images object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
Count is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
impacted object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
vulnerabilities object[]
All resource vulnerabilities.
CVE ID.
Vulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Possible values: [poc,in-the-wild
]
ExploitKind represents the kind of the exploit
Link is a link to information about the exploit.
Possible values: [,exploit-db,exploit-windows,cisa-kev
]
ExploitType represents the source of an exploit
HighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
EnvVarSecrets indicates whether a container has access to secrets via environment variables.
HostAccess indicates whether a container has access to the host network or namespace.
Internet indicates whether a container has internet access.
Network indicates whether a container is listening to ports.
NoSecurityProfile indicates whether a container has security profile issue.
PrivilegedContainer indicates whether a container runs using the --privileged flag.
RootMount indicates whether a container has access to the host file system using a root mount.
RootPrivilege indicates whether a container runs as root.
RuntimeSocket indicates whether a container has the runtime socket mounted.
HighestSeverity is the highest severity of the vulnerability.
Packages impacted by the vulnerability.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType represents the resource type
Number of resources impacted by this vulnerability.
Link to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
Risk score.
CVE status.
Date/time when the entity was modified.
registryImages object
ResourceVulnerabilityStats holds vulnerability stats of a single resource type
Count is the total number of vulnerabilities.
cves object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
impacted object
Distribution counts the number of vulnerabilities per type
.
.
.
.
.
vulnerabilities object[]
All resource vulnerabilities.
CVE ID.
Vulnerability description.
exploits object[]
Exploits represents the exploits data found for a CVE
Possible values: [poc,in-the-wild
]
ExploitKind represents the kind of the exploit
Link is a link to information about the exploit.
Possible values: [,exploit-db,exploit-windows,cisa-kev
]
ExploitType represents the source of an exploit
HighestCVSS is the highest CVSS score of the vulnerability.
highestRiskFactors object
RiskScoreFactors holds factors used to calculate risk score
EnvVarSecrets indicates whether a container has access to secrets via environment variables.
HostAccess indicates whether a container has access to the host network or namespace.
Internet indicates whether a container has internet access.
Network indicates whether a container is listening to ports.
NoSecurityProfile indicates whether a container has security profile issue.
PrivilegedContainer indicates whether a container runs using the --privileged flag.
RootMount indicates whether a container has access to the host file system using a root mount.
RootPrivilege indicates whether a container runs as root.
RuntimeSocket indicates whether a container has the runtime socket mounted.
HighestSeverity is the highest severity of the vulnerability.
Packages impacted by the vulnerability.
Possible values: [container,image,host,istio,vm,function,registryImage
]
ResourceType represents the resource type
Number of resources impacted by this vulnerability.
Link to CVE.
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
Risk score.
CVE status.
[
{
"_id": "string",
"containers": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"functions": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"hosts": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"images": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
},
"modified": "2024-07-29T15:51:28.071Z",
"registryImages": {
"count": 0,
"cves": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"impacted": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"vulnerabilities": [
{
"cve": "string",
"description": "string",
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"highestCVSS": 0,
"highestRiskFactors": {
"envVarSecrets": true,
"hostAccess": true,
"internet": true,
"network": true,
"noSecurityProfile": true,
"privilegedContainer": true,
"rootMount": true,
"rootPrivilege": true,
"runtimeSocket": true
},
"highestSeverity": "string",
"impactedPkgs": [
"string"
],
"impactedResourceType": [
"container",
"image",
"host",
"istio",
"vm",
"function",
"registryImage"
],
"impactedResourcesCnt": 0,
"link": "string",
"riskFactors": {},
"riskScore": 0,
"status": "string"
}
]
}
}
]