• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management | IT Security Solutions from Greenbone
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management | IT Security Solutions from Greenbone
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

From CVE to Management Feed: The Vulnerability Timeline

Vulnerabilities can differ greatly, however share similarities in the timeline from their discovery to documentation and a solution. The development and refinement of vulnerability tests are an essential part of this timeline and a key activity of Greenbone.

Below is the timeline for the majority of known vulnerabilities.

Vulnerability Status What does it mean and what happens? The role of Greenbone
Vulnerability Exists At some point a security bug enters a software product and no one is aware of the bug. Greenbone recommends to use tools and processes for the software development that at least prevent standard programming mistakes. We also recommend a security-centric process when integrating third party software modules. This is what we do for our own products.
Vulnerability Known Someone finds the vulnerability in the product. It could have existed for years before discovery. The finder either keeps the discovery secret and tries to exploit the knowledge for personal gain (often a criminal business model) or shares the discovery with the vendor (or security entities) for inclusion to CVE documentation processes. In the first case, the vulnerability may already be exploited for criminal or espionage purposes. At some point an additional person or entity discovers  the vulnerability and exposes this information as in the second case. The time-span from introduction of the vulnerability to exposure can be brief in an optimal case or very long in worse case scenarios. Although it is not Greenbone’s business model to actively search for unknown software vulnerabilities, our security experts may occasionally discover them. We always inform the vendor or respective security entities with all discovered information for further processing.
CVE Reserved The CVE authority issues a reserved CVE number to the reporter of the vulnerability. This way an advisory and a software fix can be prepared with a properly assigned CVE reference. Reserved CVEs are sometimes discussed in public forums for wider awareness of the vulnerability prior to the availability of a solution. This can be beneficial but also holds drawbacks as the security community helps to create detection routines for identifying the risk while malicious actors may engineer exploitation code. Due to the prevalence of malicious actors, vulnerability details may only be shared in restricted circles rather than the wider public. Greenbone monitors various places where such discussions occur. We are the good guys, and at this point begin implementing tests for our customers that can identify the presence of the vulnerability. Even if there is no solution yet, this helps the customers with isolation or other remediation measures until the vendor can present a viable solution. The preferred and primary detection routine Greenbone strives to implement is a remote unauthenticated test. The quality of detection is dependent on publicly available information (i.e. how much information is exposed about vulnerability exploitation vectors). This information often arrives from the vendor itself or the security community. The quality of detection of the initial test(s) varies, as it depends on what the vendor exposes. In the best-case scenario a non-destructive exploit can be implemented. This may subsequently be accompanied by authenticated tests to increase accuracy.
CVE Published The CVE entry gets an official publication timestamp, a severity classification and further link(s) (ideally to mitigating solutions). CVEs may be updated several times when they are newly published to include the latest research information concerning the vulnerability. Greenbone updates the security information as new information arrives regarding the CVE. This process is enhanced with various levels of automation for rapid product updates to customers.
Product Vendor Advisory The vendor of the vulnerable product publishes the information about the vulnerability and a solution for mitigation. This often entails an updated version or configuration modifications. In some cases it is possible that vendors may not react at all or not provide a solution for a vulnerability advisory. Greenbone updates security details of vulnerabilities as new information arrives from the vendor. Vendors with a formal process enable us to handle this very quickly.
Product-Integration Vendors Advisories In several cases other vendors are bundling the vulnerable product with their own, such as in supply chain vulnerabilities. This can be operating system vendors like Red Hat or smaller distribution software vendors that utilize a vulnerable software library for their product, as with log4j, for example. These vendors publish their own advisory, which may be timely or occur several weeks later. The difference of the reaction time between vendors for the same vulnerability can be observed and taken into consideration. Greenbone publishes at least one test for each vendor. This is primarily automated to increase the speed of release time to customers. The majority of these are authenticated tests with a very high quality of detection.

FAQ

How is it possible that a Greenbone test is published months prior to the respective CVE?

Greenbone does not wait for an official CVE publication. We begin working on vulnerability tests as soon as we are aware of a vulnerability. This may be measured in days, however we’ve also experienced delays in months of time until the official CVE publication. We can often link a reserved, yet unpublished CVE, however there are also cases where not even a CVE exists but is reserved and the test is in our Feed. We maintain our tests so that once a CVE exists, they are linked in our tests.

Timeline showing that Greenbone began testing CVE-2022-1232 in April 2022, months before its official publication in July 2022

Why are there so many Greenbone tests for the same vulnerability?

There are two main reasons why we have multiple tests for the same vulnerability:

  1. A test can be done from the outside as well as from the inside. The tests from the outside (also called remote checks) are simple to execute due to the scanner only requiring network access to the scanned system. Some have a high quality of detection due to the vulnerability or the tested service exposing very concrete properties. Some tests are limited to less reliable components of a service, delivering only indicators but not definitive proof. Tests from the inside typically have a higher quality detection method because they may access the software installation at its base and do not rely on external indicators. These types of scans require authentication to the target system.
  2. A vulnerable product is part of several other products or operating systems. Think of software libraries or products that are a standard part of operating systems. In this case the vendors issue their own security advisory including information about the solution. Greenbone implements tests for each of these vendors.

Visual representation of the Log4j vulnerability with text stating 'Over 125 tests by Greenbone Enterprise Feed' for CVE-2021-44228

Why are the Greenbone tests for Debian/Red Hat/etc published later than the CVE?

Each operating system vendor has their own scheme to prepare updates of third party tools. The patches must pass a quality assessment process, while affected dependencies and modules require further tests before final release of the update. The vendors publish the advisory when a tested solution is ready for distribution. Greenbone uses a mostly automated process to retrieve vendor advisories as soon as they are published to create a test for our Feed. We have experienced delays spanning from days to weeks about multiple advisories for the same vulnerability.

Example: CVE-2022-2509 (a vulnerability in GnuTLS library) was published August 1st 2022. Debian advisory was published August 8th and the SUSE advisory was published on August 18th. Slackware (July 29th) and Fedora (July 31st) were published more timely in this case.

How fast will Greenbone make a test available for a new vulnerability?

All of our heart and motivation is focused on providing vulnerability tests for prioritized advisories within 24 hours of release.

In many cases we meet that goal. In some cases more time is required and we have collected several insights for you regarding our daily challenge for your security:

  • Testing the test: After a new test is developed it is tested to send an alert in case the vulnerability is present and to stay silent if the vulnerability is not present or already fixed. Most of the testing time consists of configuring vulnerable test systems or services. We have a growing test lab of readily available systems to support this process.
  • Research: The reporters of a vulnerability often do a great job and we can implement a test immediately reports become available. Occasionally, we have in-depth questions for an optimal hit rate of our tests and need to research the details or behavior of a product. This requires considerable time to complete in cases where the vendor provides insufficient information.
  • Automation: Full and partial automation helps immensely with accelerating the development. We keep the human brains busy with new challenges while our advisory processing pipelines handle the known standard challenges and repetitive work steps.Flowchart showing vulnerability management leading into three focus areas: testing, research, and automation

How many of the published vulnerabilities is Greenbone covering?

We implement tests aiming to cover all vulnerabilities that are severe or important to our customers. To achieve this goal we are applying the following prioritization scheme:

  • Severity of the vulnerability: Of course the official severity score in the “CVSS” (Common Vulnerability Scoring System) is a relevant criterion. Severe and actively exploited vulnerabilities receive the highest priority.
  • Distribution of the product: A medium severity vulnerability in a wide-spread product such as Microsoft Windows has a higher priority for us than a critical vulnerability in a browser game, for example.
  • Viability for automation: Some product vendors have set up a formal and highly reliable process for security advisories. In such cases our automated routines will process all of the advisories regardless of severity level.

This Could Also Interest You

The Race to Protect from Cyber Attacks

We help you win a race against the attackers. How do we do it?

More

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management | IT Security Solutions from Greenbone
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.

OKPrivacy policy

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung