As we continue the Public Preview for Vulnerability Management, we’re excited to announce a major update to Vulnerability Management in N-central and N-sight, designed to help customers better prioritize and respond to threats.
This release introduces exploit intelligence directly into the platform, giving you immediate visibility into vulnerabilities that are actively being exploited in the wild. Alongside this, we’ve added deeper context for vulnerabilities, smarter asset classification, and performance improvements to increase responsiveness, especially in large environments.
What’s New
CISA Known Exploited Vulnerabilities (KEV)
Vulnerabilities now display indicators for Known Exploits and Known Ransomware, sourced from https://www.cisa.gov/known-exploited-vulnerabilities-catalog. This enables faster prioritization by highlighting threats that are currently being exploited in the wild, helping you focus on what matters most.


Common Weakness Enumeration (CWE) Details
Each detected vulnerability with a Common Weakness Enumeration identifier now includes a link to https://cwe.mitre.org for that CWE, offering insight into the underlying software weakness. This helps teams understand the root cause of vulnerabilities, assess systemic risks, and improve long-term security posture.

Server/Workstation Role Indicator
Within Vulnerability Managemen, endpoints now display a typical OS role (Server or Workstation) based on their associated operationg system. This allows for smarter prioritization where critical vulnerabilities on servers can be addressed first, reducing risk to core infrastructure and improving operational resilience.

Improved CVE Details Overlay
Clicking on a CVE hyperlink now opens a redesigned Overlay with a direct link to the CVE webpage and detailed CVSS breakdowns, Threat Information, and Affected Assets. This provides deeper context for each vulnerability, helping you assess severity and exploitability without leaving the platform.


Fixes
Database Optimization
We’ve reduced contention on the Asset/Vulnerability mapping view, resulting in faster load times and improved responsiveness in the All Detections and By Vulnerability views. This ensures a smoother experience when navigating large datasets.
Default Filtering for Performance
A new default filter now focuses on Critical and Important vulnerabilities. For large environments, we also recommend removing the Resolved threat status to further reduce load times and surface the most actionable issues.
Have questions or feedback? Reach out to our support team or use your usual communication channels—we’re here to help and always listening.
You must be logged in to post a comment.