Connect this data source on your own, using the Hunters platform.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
|---|---|---|---|---|---|---|---|
cisco-vulnerability-management-vulnerabilities | ✅ | ✅ | cisco_vulnerability_management_vulnerabilities | NDJSON | S3 | ||
cisco-vulnerability-management-assets | ✅ | ✅ | cisco_vulnerability_management_assets | NDJSON | S3 | ||
cisco-vulnerability-management-users | cisco_vulnerability_management_users | NDJSON | S3 |
Overview
Kenna Security, now part of Cisco as Cisco Vulnerability Management, is a cybersecurity company specializing in risk-based
vulnerability management. Their platform uses data science and machine learning to identify and prioritize vulnerabilities, enabling organizations to focus on the most critical threats. They offer a platform that integrates vulnerability data, threat intelligence, and zero-day data to provide a comprehensive view of an organization's risk posture.
Kenna Security's main product, Cisco Vulnerability Management (formerly Kenna.VM), helps organizations:
Prioritize Risks: Prioritize vulnerabilities based on risk scores, considering internal and external factors like exploit availability and severity.
Predict and Prevent Exploits: Track vulnerability fluctuations and forecast weaponization with predictive analytics.
Assess the Threat Landscape: Gain a comprehensive view of emerging threats and shifting trends.
In essence, Kenna Security provides a platform that helps security teams understand and manage their risk profile, prioritize remediation efforts, and enhance their overall security posture.
Docs for API - API Authentication
Docs for Cisco Kenna.- Kenna Security Is Part of Cisco
Supported data types
cisco vulnerability management vulnerabilities
Table name: cisco_vulnerability_management_vulnerabilities
Contains detailed security vulnerability information including CVE IDs, severity scores, CVSS ratings, exploitability flags, and remediation details. This data type tracks individual security flaws found on assets with their current status, priority, and associated threat intelligence.
cisco vulnerability management assets
Table name: cisco_vulnerability_management_assets
Provides comprehensive information about managed IT assets including network devices, servers, and endpoints with their network configuration, operating systems, and vulnerability counts. This data type includes asset identification details like IP addresses, hostnames, and network ports along with risk scoring and asset grouping information.
cisco vulnerability management users
Table name: cisco_vulnerability_management_users
Manages user account information and access control data including user profiles, authentication details, and role assignments within the vulnerability management system. This data type tracks user activity, permissions, and administrative access for security team members and stakeholders.
Send data to Hunters
Hunters supports the ingestion of Cisco Vulnerabilty logs via an intermediary AWS S3 bucket.
To connect Cisco logs:
Export your logs from Cisco to an AWS S3 bucket by following this guide.
Once the export is completed and the logs are collected to S3, follow the steps in this section.
Expected format
Logs are expected in JSON format.
cisco vulnerability management vulnerabilities
{
"id": 1234567890,
"status": "open",
"closed_at": null,
"created_at": "2023-01-01T12:00:00Z",
"due_date": "2023-02-01",
"notes": null,
"port": [],
"priority": 10,
"identifiers": ["123456"],
"last_seen_time": "2023-01-01T12:30:00.000Z",
"scanner_score": 5.0,
"fix_id": 12345678,
"scanner_vulnerabilities": [{"port": null, "external_unique_id": "12345678", "open": true}],
"asset_id": 12345678,
"connectors": [{"name": "Qualys Web Application Scan (WAS) - Applications", "id": 123456, "connector_definition_name": "QualysWas", "vendor": "Qualys"}],
"service_ticket": null,
"urls": {"asset": "api.example.com/assets/12345678"},
"solution": "Customers are advised to upgrade relevant versions of Apache Tomcat...",
"patch": true,
"patch_published_at": "2023-01-15T10:00:00.000Z",
"cve_id": "Apache Tomcat Remote Code Execution (RCE) Vulnerability (CVE-2023-12345)",
"cve_description": null,
"cve_published_at": null,
"description": "Apache Tomcat is an open source web server and servlet container...",
"wasc_id": null,
"severity": null,
"threat": null,
"popular_target": null,
"active_internet_breach": false,
"easily_exploitable": false,
"malware_exploitable": false,
"remote_code_execution": null,
"predicted_exploitable": false,
"platform_types": null,
"cvss_v2": null,
"cvss_v3": null,
"custom_fields": [{"name": "ServiceNow Ticket for Risk Acceptable or False Positive", "custom_field_definition_id": 2, "value": null}],
"first_found_on": "2023-01-01T12:00:00Z",
"top_priority": true,
"risk_meter_score": 100,
"closed": false
}cisco vulnerability management assets
{
"id": 16705231,
"created_at": "2023-08-22T13:25:39Z",
"priority": 10,
"operating_system": "Windows Server 2019",
"notes": null,
"last_booted_at": null,
"primary_locator": "netbios",
"locator": "WEB-SRV-01",
"vulnerabilities_count": 15,
"status": "active",
"last_seen_time": "2025-06-10T04:08:40Z",
"network_ports": [
{"id": 222522980, "port_number": 80, "extra_info": "", "hostname": null, "name": null, "ostype": "", "product": null, "protocol": "tcp", "state": "open", "version": null},
{"id": 222522981, "port_number": 443, "extra_info": "", "hostname": null, "name": null, "ostype": "", "product": null, "protocol": "tcp", "state": "open", "version": null},
{"id": 222522987, "port_number": 3389, "extra_info": "", "hostname": null, "name": null, "ostype": "", "product": null, "protocol": "tcp", "state": "open", "version": null}
],
"tags": ["Production_Servers", "Web_Assets", "Internal", "RDP", "HTTP server"],
"owner": null,
"inactive_at": "2025-06-25",
"status_set_manually": false,
"overage": false,
"urls": {"vulnerabilities": "example.com"},
"ip_address": "192.168.1.100",
"database": null,
"hostname": "web-server-01.example.com",
"fqdn": null,
"netbios": "WEB-SRV-01",
"application": null,
"file": null,
"mac_address": null,
"ec2": null,
"url": null,
"external_id": "304050090",
"image": null,
"container": null,
"ipv6": null,
"risk_meter_score": 760,
"asset_groups": [{"id": 7607, "name": "All Assets"}, {"id": 218860, "name": "Production"}]
}cisco vulnerability management users
{
"id": 21233,
"created_at": "2016-02-04T22:34:46Z",
"updated_at": "2024-04-30T14:25:35Z",
"email": "john.doe@example.com",
"firstname": "John",
"lastname": "Doe",
"phone": "+1-555-555-5555",
"external_id": null,
"last_sign_in_at": "2023-08-03T16:52:52Z",
"roles": ["administrator"],
"role_ids": [74401]
}