Vulnerability Scan Reports
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Vulnerability Scan Reports
Prisma Cloud scans images, hosts, and functions to detect vulnerabilities.
The Prisma Cloud Intelligence Stream keeps Console up to date with the latest vulnerabilities.
The data in this feed is used for agentless scanning and is also distributed to your Defenders for scanning purposes.
The initial scan is triggered when a Defender is installed, or when you enable agentless scanning, the scans check for:
- Published Common Vulnerabilities and Exposures (CVEs)
- Vulnerabilities from misconfigurations
- Malware
- Zero-day vulnerabilities
- Compliance issues
- Secrets After the initial scan, subsequent scans are triggered:
- Periodically, according to the scan interval configured in Console. By default, images are scanned every 24 hours.
- When new images are deployed onto the host.
- When scans are forced with theScanbutton in Console.
Through Console, Defender can be extended to scan images for custom components.
For example, you can configure Defender to scan an internally developed library named libexample.so, and set a policy to block a container from running if libexample.so version 1.9.9 or earlier is installed.
For more information, see Scanning custom components.
View Image Scan Reports
Review the health of all images in your environment.
Sorting the table on vulnerability severity based on data from the last scan.
If you update your vulnerability policy with a different alert threshold, rescan your images if you want to be able to sort based on your new settings.
- Open Console, then go toMonitor > Vulnerabilities > Images.The table summarizes the state of each image in your environment.All vulnerabilities identified in the last image scan can be exported to a CSV file by clicking theCSVbutton in the top left of the page.In case multiple images share the same image ID, but with different tags on different hosts, then these will be shown using +<Num> in the Tag column, as can be seen in the screenshot below.
- Click on an image report to open a detailed report.
- Click on theVulnerabilitiestab to see all CVE issues.CVE vulnerabilities are accompanied by a brief description. ClickShow detailsfor more information, including a link to the report on the National Vulnerability Database.TheFix Statuscolumn contains terms such as 'deferred', 'fixed in…', and 'open'. These strings are imported directly from the vendors' CVE databases. They are not Prisma Cloud-specific.
Tagging Vulnerabilities
To help you manage and fix the vulnerabilities in your environment, you can assign tags to each vulnerability. The list of available tags is defined under
Manage > Collections and Tags > Tags > Tag definition
(see Tag definition). To assign a tag to a vulnerability, click on the Add Tags to CVE
action in the Tags
column.Tagging a vulnerability will apply by default to the CVE ID, package, and resource you assigned the tag from. You can granularly adjust and extend the tag scope under
Manage > Collections and Tags > Tags > Tag assignment
(see Tag assignment).For example, assigning a tag from the following scan report will apply to CVE-2020-16156, package perl, and image ubuntu:20.04.

You can also add comments to each tag assignment, for example, to explain the reason this tag was added.
Do it by clicking the comment icon on the left side of the tag.
By default, all vulnerabilities, according to your policy, are listed.
However, you can also examine vulnerabilities only with specific tags.
Use the drop-down list to filter by tags.

Remove a tag from a vulnerability using the close action available on the tag.
When removing a tag from the scan report, the entire tag assignment is removed, which may be wider than just the single place you remove it from. For example, removing a tag that is applied to image ubuntu:20.04 by a tag assignment defined for images ubuntu:*, will remove the entire tag assignment, which means the tag will be removed from all ubuntu images.
For more granular tag removal, go to the
Manage > Collections and Tags > Tags > Tag assignment
, and adjust the relevant tag scope.Per-layer Vulnerability Analysis
To make it easier to understand how images are constructed and what components have vulnerabilities, Prisma Cloud correlates vulnerabilities to layers.
This tool helps you assess how vulnerabilities were introduced into an image, and pick a starting point for remediation.
To see the layer analysis, click on an image to open the scan report, then click the
Layers
tab.
There are differences in the scan results between an image created by a Dockerfile and an image pulled by a registry.
This is because the times in the image created by Dockerfile are more accurate. Therefore the vulerability scan results from the Dockerfile are more accurate.
RHEL Images
The Prisma Cloud layers tool shows the instructions used to create each layer in an image.
RHEL images, however, don’t contain the necessary metadata, so the Prisma Cloud layers tool shows an empty black box.

To validate that the required metadata is absent, run docker history IMAGE-ID on a non-RHEL image.
The CREATED BY column is fully populated.

Next, run docker history IMAGE-ID on an RHEL image.
Notice that the CREATED BY column is empty.

Packages Information
Prisma Cloud uses risk scores to calculate the severity of vulnerabilities in your environment.
Scan reports have a
Package info
tab, which lists all the packages installed in an image or host.
It also shows all active packages, which are packages used by running software.To see these active packages, open a scan report, open the
Package info
tab, and look at the Binaries
column (see the App
column in host scan reports).
This column shows what’s actually running in the container.
For example, the fluent/fluentd:latest container in the following screenshot runs /usr/bin/ruby.
One of the packages utilized by the Ruby runtime is the bigdecimal gem.
If you were prioritizing mitigation work, and there was a severe vulnerability in bigdecimal, bigdecimal would be a good candidate to address first.
Process Information
Prisma Cloud scan reports provide visibility over the startup processes of the image.
To see the image startup processes, open a scan report and go to the
Process info
tab.The processes list is created by a static analysis of the image, which first parses the image history to get the list of startup binaries.
The algorithm then iterates over the image binaries and tries to find these startup binaries on the disk (in the file system).
Those which were found are displayed under the
Process info
tab.
Per-finding Timestamps
The image scan reports of Prisma Cloud show the following per-vulnerability timestamps:
- Age of the vulnerability based on the discovery date. This is the first date that the Prisma Cloud scanner found the vulnerability.
- Age of the vulnerability based on its published date. This represents the date the vulnerability was announced to the world.
Registry scan reports show the published date only.

Timestamps are per-image, per-vulnerability.
For example, if CVE-2019-1234 was found in image foo/foo:3.1 last week and image bar/bar:7.8 is created from foo/foo:3.1 today, then the scan results for foo show the discovery date for CVE-2019-1234 to be last week and for bar it shows today.
Timestamped findings are useful when you have time-based SLAs for remediating vulnerabilities (e.g. all critical CVEs must be fixed within 30 days).
Per-finding timestamp data makes it possible to track compliance with these SLAs.
Host and VM Image Scanning
Prisma Cloud also scans your hosts and VM images for vulnerabilities.
To see the scan report for your hosts and VM images, go to
Monitor > Vulnerabilities > Hosts
.By default, all vulnerable packages, according to your policy, are listed.
However, you can also examine vulnerabilities specific to an app (systemd service).
Use the drop-down list to select an app.
Clear the selection to see all vulnerabilities for a host/VM image.

The
Package Info
tab lists all packages installed on the host/VM image.
If a package has a component utilized by a running app, the affected running apps are listed in the Apps
column.Prisma Cloud also collects and displays package license details.
License information is available at all places where package details are displayed,
such as
Monitor > Vulnerabilities > Images
(under the Package Info
tab),
Monitor > Vulnerabilities > Hosts
and Monitor > Vulnerabilities > Registry
, as well as the corresponding API endpoints.
Licensing compliance is supported only for viewing purposes and cannot be included in policies for alert/block capabilities.
Scan Status
The initial scan can take substantial time when you have a large number of images. Subsequent scans are much faster.
To see the status of the image scans, go to
Monitor > Vulnerabilities > Images
.Each row in the table represents an image in your environment.
If an image is being scanned, a progress bar shows the status of the scan.
If there is no progress bar, the scan has been completed.
Package Types
Prisma Cloud uses compliance identification numbers to designate the package type when reporting vulnerabilities in images.
Compliance IDs can be found in the CSV export files and API responses.
To download image reports in CSV format, go to
Monitor > Vulnerabilities > Images
, and click the CSV
button at the top of the table.
The Compliance ID
, Type
, and Packages
fields report the package ID, package type, and package name respectively.
The API output reports compliance IDs only.
The following table shows how compliance IDs map to package type.
Compliance ID number | Package type |
---|---|
46 | Operating system/distro packages |
47 | JAR files |
48 | Gem files |
49 | Node.js |
410 | Python |
411 | Binary |
412 | Custom (set by customer) |
415 | Nuget |
416 | Go |