Recent
MP
Asset Detail
Investigate what’s vulnerable, why it matters, and the safest path to remediation.
Asset ID: AST-009217
Owner: FinOps
Exposure: Internet-facing (restricted)
Summary
Key facts + risk score factors (click to filter the list)
Risk Score 81
Last scan: 34m
EDR agent: online
Business service
Payments API
Runtime
Ubuntu 22.04 OpenJDK 17
Ownership
Team: FinOps
Primary: finops-oncall
Escalation: sec-eng@patchpulse.example
Criticality
Tier 0 PCI scope
Risk factors
Risk meter
Score drivers: Crit 28 · Chatter 22 · Exposure 18 · Patch 13
Deep link: share asset.html#intel to open Exploit Signals.
Vulnerabilities
Detected on pay-api-17.prod.internal
Patch status: 2 pending
| CVE | Package / Component | Detected | Fixed | Severity | Exploit signal | Patch status | Recommended action |
|---|---|---|---|---|---|---|---|
| CVE-2024-3094 | xz-libs / liblzma | 5.6.0 | 5.4.6 (vendor) | Critical | KEV + PoC | Pending | |
| CVE-2023-44487 | nginx / HTTP/2 | 1.22.1 | 1.24.0+ | High | Trending | Mitigate | |
| CVE-2024-21626 | runc | 1.1.10 | 1.1.12 | High | Low | Not applicable |
Row expand example: proof + apply playbook
Proof of detection (CVE-2024-3094)
Plugin: Nessus #190856 · Output: "Detected liblzma.so.5.6.0 linked via openssh-server"
Affected paths
- /usr/lib/x86_64-linux-gnu/liblzma.so.5
- /usr/sbin/sshd (linked)
Exploit Signals
Correlation across advisories, social chatter, and exploit repos
Confidence 0.86
Sources
CISA KEV
First seen: Dec 10 · Last seen: Dec 11
Listed
Exploit repo mentions
PoC referenced; no reliable weaponized chain observed
Medium
Vendor advisory
Ubuntu USN + upstream notes
Verified
Changes
Recent deployments and config changes (mocked)Deploy2025-12-10 21:32Z · payments-api:v2.18.4 → v2.18.5
CI/CDPackage update2025-12-09 03:11Z · openssh-server security update applied
OKFirewall2025-12-07 16:40Z · allowlist updated for partner IP range
ReviewedControls
Compensating controls and validation checks (mocked)Network
- Inbound SSH restricted to bastion subnet
- WAF in front of public endpoints
Host
- EDR prevention enabled (Prod-Servers)
- File integrity monitoring: /usr/sbin
Updated
Action completed.