Dashboard: PAN-OS CVEs
Focus
Focus
Strata Cloud Manager

Dashboard: PAN-OS CVEs

Table of Contents

Dashboard: PAN-OS CVEs

Learn how to how to view CVEs and the devices impacted by them.
Where Can I Use This?
What Do I Need?
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • VM-Series, funded with Software NGFW Credits
  • AIOps for NGFW Free (use the AIOps for NGFW Free app)
    license
  • AIOps for NGFW Premium license (use the Strata Cloud Manager app)
    license for generating upgrade recommendations
  • Click
    Dashboards > More Dashboards > PAN-OS CVEs
    to get started.

What does this dashboard show you?

The dashboard shows the aggregated data for all firewalls and Panorama onboarded to your tenant and are also sending telemetry data. Additionally, it shows the telemetry data from NGFW PSIRT Database of CVEs.
The
PAN-OS CVEs
dashboard shows you the number of devices impacted by a specific vulnerability based on the features that have been enabled on devices.
Strata Cloud Manager
analyzes the features that have been enabled to determine the devices impacted by the CVE.
After you understand the vulnerabilities for impacted devices, you can plan your patching using the Upgrade Recommendations feature. Expand the CVEs and select firewalls that you want to upgrade to fix the vulnerabilities, and click
Generate Upgrade Recommendations
. You are redirected to NGFW - Upgrade Recommendations to view the generated report.
Here is how to assess vulnerabilities that impact devices and generate upgrade recommendation to fix the vulnerabilities.

How can you use the data from the dashboard?

This dashboard helps you:
  • Decide which devices to upgrade to mitigate a vulnerability.
  • View details about an impacted device such as Host Name, Model, Serial Number, SW Version, and Last Telemetry Update by expanding a CVE.
  • Filter CVEs and sort them further by
    Severity
    or
    Devices Impacted
    .
  • View the advisory associated with a CVE by clicking it.

Recommended For You