Monitor Libraries

The Libraries page provides a list of all libraries that are in use by the corresponding applications. The page highlights the vulnerabilities and associated risks introduced by the use of those libraries. You can use the Search filter for the Application, Package Language, Tiers, Status, and Libraries categories. See Monitor Application Security Using .

The Libraries page includes these details:

Field NameDescription
Library

Libraries in the selected application. You can click on the row to view the details of the library. See View Library Details.

Application The application name that uses the corresponding library.
Tier (Nodes)

The application tier that is vulnerable because of its relationship to the corresponding library. Click the flow map icon () next to an application to view the application flow map in the Splunk AppDynamics dashboard.

Highest Cisco Security Risk Score The Cisco Security Risk Score provides an estimate of exploitation based on real-time events. These are the three statuses:
  • Green 0-33
  • Amber 34-66
  • Red 67-100
Highest CVSS Score This score is based on the Common Vulnerability Scoring System (CVSS) with five severities:
  • None 0-0
  • Low 0.1-3.9
  • Medium 4.0-6.9
  • High 7.0-8.9
  • Critical 9.0-10.0
Total Vulnerabilities

The number of vulnerabilities based on severity:

  • Critical
  • High
  • Medium
  • Low

Hover on the required color to know the severity. Click this field to sort in increasing or decreasing order based on the number of vulnerabilities.

Remediation The recommended version of the library that can be used for remediation.
Status

The status of the vulnerable libraries. By default, when a vulnerability is detected the value is Detected. The status value can be:

  • Detected (at least one vulnerability is detected in the library)
  • Confirmed (Library is reviewed)
  • Upgraded (Library is upgraded to fix the issue)
  • Downgraded (Library is downgraded to fix the issue)
  • Removed (Library is removed to fix the issue)
  • Ignored (the library does not require to be considered when remediating vulnerability libraries because of some mitigations or exception)
  • Not Vulnerable (no vulnerabilities are found in the library)

The Detected, Downgraded, and Upgraded status are auto-populated. If you have the Configure Cisco Secure Application permission, you can change the Status by selecting the required libraries and using the Set Status option. You must have the Configure permission to view and use the Set Status and Edit Note options. Click this field to sort based on the status of the vulnerable library.