×

Automated determination of vulnerability importance

  • US 10,235,528 B2
  • Filed: 11/09/2016
  • Issued: 03/19/2019
  • Est. Priority Date: 11/09/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method, in a data processing system comprising a processor and a memory coupled to the processor, the memory comprising instructions that are executed by the processor to cause the processor to be configured to implement a vulnerability importance identification mechanism for automatically determining an importance of vulnerabilities identified in an application, the method comprising:

  • scanning, by scanning logic in the vulnerability importance identification mechanism, an identified application for a set of vulnerabilities with uncertain importance, wherein each vulnerability with uncertain importance in the set of vulnerabilities with uncertain importance fails to have an associated importance;

    for each vulnerability with uncertain importance in the set of vulnerabilities with uncertain importance;

    identifying, by the scanning logic, a set of characteristics, wherein the set of characteristics includes a location of the vulnerability with uncertain importance within source code of the application (including a file name and line number(s)), a host name where the application resides, a domain name associated with the application, and a pathname to the application;

    utilizing the set of characteristics associated with the vulnerability with uncertain importance, determining, by scoring logic in the vulnerability importance identification mechanism, a level of importance for the vulnerability with uncertain importance; and

    assigning, by importance identification logic in the vulnerability importance identification mechanism, the level of importance to the vulnerability with uncertain importance thereby forming an identified level of importance; and

    with a respective identified level of importance assigned to each vulnerability, with uncertain importance in the set of vulnerabilities with uncertain importance thereby forming a set of vulnerabilities with identified level of importance, presenting, by the vulnerability importance identification mechanism, the set of vulnerabilities with identified level of importance to a user so that the set of vulnerabilities with identified level of importance are addressed by the user based on the respective identified level of importance.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×