Known Exploit Info for 3P Apps Now Available in Vulnerability Management for N-Central and N-Sight

As we continue the Public Preview for Vulnerability Management, we’re excited to announce a major update to Vulnerability Management in N-central and N-sight, designed to help customers better prioritize and respond to threats.

This release introduces exploit intelligence directly into the platform, giving you immediate visibility into vulnerabilities that are actively being exploited in the wild. Alongside this, we’ve added deeper context for vulnerabilities, smarter asset classification, and performance improvements to increase responsiveness, especially in large environments.

What’s New

CISA Known Exploited Vulnerabilities (KEV)

Vulnerabilities now display indicators for Known Exploits and Known Ransomware, sourced from https://www.cisa.gov/known-exploited-vulnerabilities-catalog. This enables faster prioritization by highlighting threats that are currently being exploited in the wild, helping you focus on what matters most.

Read more: Known Exploit Info for 3P Apps Now Available in Vulnerability Management for N-Central and N-Sight

Common Weakness Enumeration (CWE) Details

Each detected vulnerability with a Common Weakness Enumeration identifier now includes a link to https://cwe.mitre.org for that CWE, offering insight into the underlying software weakness. This helps teams understand the root cause of vulnerabilities, assess systemic risks, and improve long-term security posture.

Server/Workstation Role Indicator

Within Vulnerability Managemen, endpoints now display a typical OS role (Server or Workstation) based on their associated operationg system. This allows for smarter prioritization where critical vulnerabilities on servers can be addressed first, reducing risk to core infrastructure and improving operational resilience.

Improved CVE Details Overlay

Clicking on a CVE hyperlink now opens a redesigned Overlay with a direct link to the CVE webpage and detailed CVSS breakdowns, Threat Information, and Affected Assets. This provides deeper context for each vulnerability, helping you assess severity and exploitability without leaving the platform.

Fixes

Database Optimization

We’ve reduced contention on the Asset/Vulnerability mapping view, resulting in faster load times and improved responsiveness in the All Detections and By Vulnerability views. This ensures a smoother experience when navigating large datasets.

Default Filtering for Performance

A new default filter now focuses on Critical and Important vulnerabilities. For large environments, we also recommend removing the Resolved threat status to further reduce load times and surface the most actionable issues.

Have questions or feedback? Reach out to our support team or use your usual communication channels—we’re here to help and always listening.

This entry was posted in N-central, N-sight, Vulnerability Management. Bookmark the permalink.