Updates in Vulnerability Management feature for N-central and N-sight
Updates in Vulnerability Management feature for N-central and N-sight
N-able brings several enhancements to Vulnerability management in it’s latest release (preview), with a strong focus on exploit intelligence and contextual information.
Key Updates to Vulnerability Management
-
CISA Known Exploited Vulnerabilities (KEV) Indicators: Vulnerabilities are showing indicators for Known Exploits and Known Ransomware, pulling data from the CISA KEV catalog. This is the major highlight, allowing users to immediately prioritize threats that are actively being exploited in the wild.
-
Common Weakness Enumeration (CWE) Details: Detected vulnerabilities with a CWE identifier now include a link to the corresponding CWE web site (via cwe.mitre.org). This helps teams understand the root cause of the software weakness and improve long-term security.
-
Server/Workstation Role Indicator: Endpoints now display their typical OS role (Server or Workstation). This enables smarter prioritization, allowing critical vulnerabilities on servers to be addressed first.
-
Improved CVE Details Overlay: The redesigned overlay provides a direct link to the CVE webpage and detailed CVSS breakdowns, Threat Information, and Affected Assets, offering deeper context without leaving the platform.
Improved Performance and Usability
This update includes fixes aimed at increasing responsiveness, especially in large environments like:
-
Database Optimization: In a situation where multiple processes or threads are simultaneously trying to access and modify the same resource in the Asset/Vulnerability mapping view results, N-able reduced contention that resulted in faster load times.
-
Default Filtering: New default filter is focused on Critical and Important vulnerabilities, that speeds up the display of the most actionable issues.
-
Now, when you click a vulnerability link (CVE), a new window pops up (Overlay). This window gives you detailed information like a direct link to the official CVE page, full CVSS severity scores, details about the threats, and a list of all affected systems.
All these updates provide users with immediate visibility into exploited threats and the context needed to reduce risk to their core infrastructure.