IoT Device Vulnerability Detection
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Network Segments Configuration
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- Authorize On-demand PCAP
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
IoT Device Vulnerability Detection
IoT Security detects vulnerabilities and potential vulnerabilities
in IoT devices.
A vulnerability refers to an intrinsic
flaw built into the software or hardware of a device that is often
well-known and can be exploited in some way. A risk, on the other
hand, considers environmental, configuration, behavioral, and security
policy-related factors in addition to one or more underlying vulnerabilities.
This distinction is important because some risks appear in the device
details page but not on the Vulnerabilities page, and yet they can
influence the severity level that IoT Security assigns to a vulnerability.
IoT Security considers a vulnerability to be potential when it
applies to a specific device type, model, and version number and
one or more devices match the specified device type but their model
and/or version number are unknown. Similarly, a device is considered
to be potentially vulnerable for the same reason.
A vulnerability can also be considered potential if it only applies
to devices with certain serial numbers and there are devices whose
serial numbers are unknown but match the vulnerability description
in all other regards.
The IoT Security app detects vulnerabilities for IoT devices
only. It does not provide vulnerability detection, alerts, policy
recommendations, and network behavior analysis for IT devices. For
IT devices, the IoT Security app provides device identification
only.