Exporting Azure Container Registry Vulnerability Assessment in Azure Security Center

Published Mar 26 2020 04:45 AM 3,792 Views
Microsoft

Using Azure Security Center Standard tier with the Container Registries bundle enabled, you can monitor your ARM-based Azure Container Registry. When a new image is pushed, Security Center scans the image using a scanner from the industry-leading vulnerability scanning vendor, Qualys.

For every vulnerability, Security Center provides actionable recommendations, along with guidance for how to remediate the issue. This assessment is available in the Azure Security Center dashboard as shown below:

 

ACR_Fig1.JPG

 

While this visualization is very helpful and dynamic, one question that comes up very often is: how can I export this assessment to a CSV file? The answer is: you can do that using Azure Resource Graph (ARG)! Follow the steps below to perform this task:

 

1. In the Azure Portal, go to Resource Graph Explorer as shown below:

 

Fig1_1.JPG

 

2. Type the query below:

 

securityresources
where type == "microsoft.security/assessments"
where properties.displayName contains "Vulnerabilities in Azure Container Registry images should be remediated"
summarize by assessmentKey=name //the ID of the assessment
join kind=inner (
    securityresources
     | where type == "microsoft.security/assessments/subassessments"
     | extend assessmentKey = extract(".*assessments/(.+?)/.*",1,  id)
 ) on assessmentKey
project assessmentKey, subassessmentKey=name, id, parse_json(properties), resourceGroup, subscriptionId, tenantId
extend description = properties.description,
         displayName = properties.displayName,
         resourceId = properties.resourceDetails.id,
         resourceSource = properties.resourceDetails.source,
         category = properties.category,
         severity = properties.status.severity,
         code = properties.status.code,
         timeGenerated = properties.timeGenerated,
         remediation = properties.remediation,
         impact = properties.impact,
         vulnId = properties.id,
         additionalData = properties.additionalData

 

3. Click Run Query button and you will see the result, similar to figure below:

ACR_Fig3.JPG

 

4. Click Download as CSV button.

Now that you download the CVS, you can open it and consume the data generated by the assessment.

 

Reviewers:

Maya Herskovic, Assaf Israel and Lana Salameh from the Azure Security Center Engineering Team

2 Comments
Occasional Contributor

@Yuri Diogenes  Thank you so much. This is really helpful. 

Occasional Visitor

@Yuri Diogenes is there a way to retrieve the package information as a typed field in the query ?

Also, what the query should look like if one would want to have 1 CVE per line?

 

{
    "description": "Debian has released security update for systemd to fix the vulnerabilities.<P>",
    "displayName": "Debian Security Update for systemd",
    "resourceDetails": {
        "source": "Azure",
        "id": "/repositories/myrepo/manyvuln/images/sha256:4343f035d365cc3968f4276e712dbb42908de6f5538611668b03b7b69c142593"
    },
    "additionalData": {
        "assessedResourceType": "ContainerRegistryVulnerability",
        "vendorReferences": [
            {
                "title": "CVE-2018-1049",
                "link": "https://security-tracker.debian.org/tracker/CVE-2018-1049"
            },
            {
                "title": "CVE-2018-15686",
                "link": "https://security-tracker.debian.org/tracker/CVE-2018-15686"
            }
        ],
        "publishedTime": "2019-05-06T10:54:00.0000000Z",
        "patchable": true,
        "type": "Vulnerability",
        "cvss": {
            "2.0": {
                "base": 10
            },
            "3.0": {
                "base": 9.8
            }
        },
        "cve": [
            {
                "title": "CVE-2018-1049",
                "link": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049"
            },
            {
                "title": "CVE-2018-15686",
                "link": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686"
            }
        ],
        "repositoryName": "myrepo/manyvuln",
        "registryHost": "myregistry.azurecr.io",
        "imageDigest": "sha256:4343f035d365cc3968f4276e712dbb42908de6f5538611668b03b7b69c142593"
    },
    "status": {
        "severity": "High",
        "code": "Unhealthy"
    },
    "timeGenerated": "2020-10-17T07:35:03.4900000Z",
    "remediation": "Refer to <A HREF=\"https://security-tracker.debian.org/tracker/CVE-2018-15686\" TARGET=\"_blank\">Debian 9 - CVE-2018-15686</A> and <A HREF=\"https://security-tracker.debian.org/tracker/CVE-2018-1049\" TARGET=\"_blank\">Debian 9 - CVE-2018-1049</A> to address this issue and obtain further details.\n<P>Patch:<BR>\nFollowing are links for downloading patches to fix the vulnerabilities:\n<P> <A HREF=\"https://security-tracker.debian.org/tracker/CVE-2018-15686\" TARGET=\"_blank\">CVE-2018-15686: Debian</A><P> <A HREF=\"https://security-tracker.debian.org/tracker/https://security-tracker.debian.org/tracker/CVE-2018-15686\" TARGET=\"_blank\">CVE-2018-1049: Debian</A>",
    "category": "Debian",
    "id": "176875",
    "impact": "This vulnerability could be exploited to gain partial access to sensitive information. Malicious users could also use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability."
}
%3CLINGO-SUB%20id%3D%22lingo-sub-1255244%22%20slang%3D%22en-US%22%3EExporting%20Azure%20Container%20Registry%20Vulnerability%20Assessment%20in%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1255244%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%20margin%3A%200px%3B%22%3EUsing%20%3CA%20style%3D%22background-color%3A%20transparent%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23146cac%3B%20text-decoration%3A%20underline%3B%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fazure-container-registry-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%20Standard%20tier%20with%20the%20Container%20Registries%3C%2FA%3E%20bundle%20enabled%2C%20you%20can%20monitor%20your%20ARM-based%20Azure%20Container%20Registry.%20When%20a%20new%20image%20is%20pushed%2C%20Security%20Center%20scans%20the%20image%20using%20a%20scanner%20from%20the%20industry-leading%20vulnerability%20scanning%20vendor%2C%20Qualys.%3C%2FP%3E%0A%3CP%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%20margin%3A%200px%3B%22%3EFor%20every%20vulnerability%2C%20Security%20Center%20provides%20actionable%20recommendations%2C%20along%20with%20guidance%20for%20how%20to%20remediate%20the%20issue.%20This%20assessment%20is%20available%20in%20the%20Azure%20Security%20Center%20dashboard%20as%20shown%20below%3A%3C%2FP%3E%0A%3CP%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%20margin%3A%200px%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ACR_Fig1.JPG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F179685i05EDD2336859AF08%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ACR_Fig1.JPG%22%20alt%3D%22ACR_Fig1.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20this%20visualization%20is%20very%20helpful%20and%20dynamic%2C%20one%20question%20that%20comes%20up%20very%20often%20is%3A%20%3CEM%3Ehow%20can%20I%20export%20this%20assessment%20to%20a%20CSV%20file%3F%3C%2FEM%3E%20The%20answer%20is%3A%20you%20can%20do%20that%20using%20Azure%20Resource%20Graph%20(ARG)!%20Follow%20the%20steps%20below%20to%20perform%20this%20task%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1.%20In%20the%20Azure%20Portal%2C%20go%20to%20Resource%20Graph%20Explorer%20as%20shown%20below%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Fig1_1.JPG%22%20style%3D%22width%3A%20633px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F179687iB73B930386D720DE%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Fig1_1.JPG%22%20alt%3D%22Fig1_1.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%20Type%20the%20query%20below%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20style%3D%22color%3A%20%23000000%3B%20background-color%3A%20%23fffffe%3B%20font-family%3A%20Consolas%2C%20'Courier%20New'%2C%20monospace%3B%20font-weight%3A%20normal%3B%20font-size%3A%2014px%3B%20line-height%3A%2019px%3B%20white-space%3A%20pre%3B%22%3E%0A%3CDIV%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3Esecurityresources%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Ewhere%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3Btype%26nbsp%3B%3D%3D%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23a31515%3B%22%3E%22microsoft.security%2Fassessments%22%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Ewhere%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3Bproperties.displayName%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Econtains%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23a31515%3B%22%3E%22Vulnerabilities%26nbsp%3Bin%26nbsp%3BAzure%26nbsp%3BContainer%26nbsp%3BRegistry%26nbsp%3Bimages%26nbsp%3Bshould%26nbsp%3Bbe%26nbsp%3Bremediated%22%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Esummarize%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Eby%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3BassessmentKey%3Dname%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23008000%3B%22%3E%2F%2Fthe%26nbsp%3BID%26nbsp%3Bof%26nbsp%3Bthe%26nbsp%3Bassessment%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Ejoin%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3Bkind%3Dinner%26nbsp%3B(%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bsecurityresources%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Ewhere%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3Btype%26nbsp%3B%3D%3D%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23a31515%3B%22%3E%22microsoft.security%2Fassessments%2Fsubassessments%22%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Eextend%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3BassessmentKey%26nbsp%3B%3D%26nbsp%3Bextract(%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23a31515%3B%22%3E%22.*assessments%2F(.%2B%3F)%2F.*%22%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%2C%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%2309885a%3B%22%3E1%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%2C%26nbsp%3B%26nbsp%3Bid)%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B)%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Eon%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3BassessmentKey%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Eproject%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3BassessmentKey%2C%26nbsp%3BsubassessmentKey%3Dname%2C%26nbsp%3Bid%2C%26nbsp%3Bparse_json(properties)%2C%26nbsp%3BresourceGroup%2C%26nbsp%3BsubscriptionId%2C%26nbsp%3BtenantId%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%7C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%230000ff%3B%22%3Eextend%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3Bdescription%26nbsp%3B%3D%26nbsp%3Bproperties.description%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BdisplayName%26nbsp%3B%3D%26nbsp%3Bproperties.displayName%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BresourceId%26nbsp%3B%3D%26nbsp%3Bproperties.resourceDetails.id%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BresourceSource%26nbsp%3B%3D%26nbsp%3Bproperties.resourceDetails.source%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bcategory%26nbsp%3B%3D%26nbsp%3Bproperties.category%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bseverity%26nbsp%3B%3D%26nbsp%3Bproperties.status.severity%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bcode%26nbsp%3B%3D%26nbsp%3Bproperties.status.code%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BtimeGenerated%26nbsp%3B%3D%26nbsp%3Bproperties.timeGenerated%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bremediation%26nbsp%3B%3D%26nbsp%3Bproperties.remediation%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3Bimpact%26nbsp%3B%3D%26nbsp%3Bproperties.impact%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BvulnId%26nbsp%3B%3D%26nbsp%3Bproperties.id%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22color%3A%20%23000000%3B%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3BadditionalData%26nbsp%3B%3D%26nbsp%3Bproperties.additionalData%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3.%20Click%20%3CEM%3ERun%20Query%3C%2FEM%3E%20button%20and%20you%20will%20see%20the%20result%2C%20similar%20to%20figure%20below%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ACR_Fig3.JPG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F179695i2D317222D2125D38%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ACR_Fig3.JPG%22%20alt%3D%22ACR_Fig3.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E4.%20Click%20%3CI%3EDownload%20as%20CSV%3C%2FI%3E%20button.%3C%2FP%3E%0A%3CP%3ENow%20that%20you%20download%20the%20CVS%2C%20you%20can%20open%20it%20and%20consume%20the%20data%20generated%20by%20the%20assessment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EReviewers%3A%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3EMaya%20Herskovic%2C%20Assaf%20Israel%20and%26nbsp%3BLana%20Salameh%20from%20the%20Azure%20Security%20Center%20Engineering%20Team%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1255244%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1477728%22%20slang%3D%22en-US%22%3ERe%3A%20Exporting%20Azure%20Container%20Registry%20Vulnerability%20Assessment%20in%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1477728%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F124214%22%20target%3D%22_blank%22%3E%40Yuri%20Diogenes%3C%2FA%3E%26nbsp%3B%20Thank%20you%20so%20much.%20This%20is%20really%20helpful.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1791721%22%20slang%3D%22en-US%22%3ERe%3A%20Exporting%20Azure%20Container%20Registry%20Vulnerability%20Assessment%20in%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1791721%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F124214%22%20target%3D%22_blank%22%3E%40Yuri%20Diogenes%3C%2FA%3E%26nbsp%3Bis%20there%20a%20way%20to%20retrieve%20the%20package%20information%20as%20a%20typed%20field%20in%20the%20query%20%3F%3C%2FP%3E%3CP%3EAlso%2C%20what%20the%20query%20should%20look%20like%20if%20one%20would%20want%20to%20have%201%20CVE%20per%20line%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CPRE%3E%7B%0A%20%20%20%20%22description%22%3A%20%22Debian%20has%20released%20security%20update%20for%20systemd%20to%20fix%20the%20vulnerabilities.%26lt%3BP%26gt%3B%22%2C%0A%20%20%20%20%22displayName%22%3A%20%22Debian%20Security%20Update%20for%20systemd%22%2C%0A%20%20%20%20%22resourceDetails%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%22source%22%3A%20%22Azure%22%2C%0A%20%20%20%20%20%20%20%20%22id%22%3A%20%22%2Frepositories%2Fmyrepo%2Fmanyvuln%2Fimages%2Fsha256%3A4343f035d365cc3968f4276e712dbb42908de6f5538611668b03b7b69c142593%22%0A%20%20%20%20%7D%2C%0A%20%20%20%20%22additionalData%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%22assessedResourceType%22%3A%20%22ContainerRegistryVulnerability%22%2C%0A%20%20%20%20%20%20%20%20%22vendorReferences%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22title%22%3A%20%22CVE-2018-1049%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22link%22%3A%20%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-1049%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22title%22%3A%20%22CVE-2018-15686%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22link%22%3A%20%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-15686%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%22publishedTime%22%3A%20%222019-05-06T10%3A54%3A00.0000000Z%22%2C%0A%20%20%20%20%20%20%20%20%22patchable%22%3A%20true%2C%0A%20%20%20%20%20%20%20%20%22type%22%3A%20%22Vulnerability%22%2C%0A%20%20%20%20%20%20%20%20%22cvss%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%222.0%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22base%22%3A%2010%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%223.0%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22base%22%3A%209.8%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%22cve%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22title%22%3A%20%22CVE-2018-1049%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22link%22%3A%20%22http%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2018-1049%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22title%22%3A%20%22CVE-2018-15686%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22link%22%3A%20%22http%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2018-15686%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%22repositoryName%22%3A%20%22myrepo%2Fmanyvuln%22%2C%0A%20%20%20%20%20%20%20%20%22registryHost%22%3A%20%22myregistry.azurecr.io%22%2C%0A%20%20%20%20%20%20%20%20%22imageDigest%22%3A%20%22sha256%3A4343f035d365cc3968f4276e712dbb42908de6f5538611668b03b7b69c142593%22%0A%20%20%20%20%7D%2C%0A%20%20%20%20%22status%22%3A%20%7B%0A%20%20%20%20%20%20%20%20%22severity%22%3A%20%22High%22%2C%0A%20%20%20%20%20%20%20%20%22code%22%3A%20%22Unhealthy%22%0A%20%20%20%20%7D%2C%0A%20%20%20%20%22timeGenerated%22%3A%20%222020-10-17T07%3A35%3A03.4900000Z%22%2C%0A%20%20%20%20%22remediation%22%3A%20%22Refer%20to%20%26lt%3BA%20HREF%3D%5C%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-15686%5C%22%20TARGET%3D%5C%22_blank%5C%22%26gt%3BDebian%209%20-%20CVE-2018-15686%26lt%3B%2FA%26gt%3B%20and%20%26lt%3BA%20HREF%3D%5C%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-1049%5C%22%20TARGET%3D%5C%22_blank%5C%22%26gt%3BDebian%209%20-%20CVE-2018-1049%26lt%3B%2FA%26gt%3B%20to%20address%20this%20issue%20and%20obtain%20further%20details.%5Cn%26lt%3BP%26gt%3BPatch%3A%26lt%3BBR%26gt%3B%5CnFollowing%20are%20links%20for%20downloading%20patches%20to%20fix%20the%20vulnerabilities%3A%5Cn%26lt%3BP%26gt%3B%20%26lt%3BA%20HREF%3D%5C%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-15686%5C%22%20TARGET%3D%5C%22_blank%5C%22%26gt%3BCVE-2018-15686%3A%20Debian%26lt%3B%2FA%26gt%3B%26lt%3BP%26gt%3B%20%26lt%3BA%20HREF%3D%5C%22https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2Fhttps%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2018-15686%5C%22%20TARGET%3D%5C%22_blank%5C%22%26gt%3BCVE-2018-1049%3A%20Debian%26lt%3B%2FA%26gt%3B%22%2C%0A%20%20%20%20%22category%22%3A%20%22Debian%22%2C%0A%20%20%20%20%22id%22%3A%20%22176875%22%2C%0A%20%20%20%20%22impact%22%3A%20%22This%20vulnerability%20could%20be%20exploited%20to%20gain%20partial%20access%20to%20sensitive%20information.%20Malicious%20users%20could%20also%20use%20this%20vulnerability%20to%20change%20partial%20contents%20or%20configuration%20on%20the%20system.%20Additionally%20this%20vulnerability%20can%20also%20be%20used%20to%20cause%20a%20limited%20denial%20of%20service%20in%20the%20form%20of%20interruptions%20in%20resource%20availability.%22%0A%7D%3C%2FPRE%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Mar 26 2020 05:23 AM
Updated by: