Use of software with known vulnerabilities in environments
Description
The system uses the version of a software or dependency with known vulnerabilities.
Impact
Exploit found vulnerabilities in the affected components.
Recommendation
Update the affected software to the versions recommended by the vendor.
Threat
Authenticated attacker from the Internet.
Expected Remediation Time
⏱️ 60 minutes.
Requirements
262 - Verify third-party components