Insights via the Hybrid Cloud Console - Evaluate and remediate CVEs.
While this is an Insights advisor in Satellite lab, this software is only a part of the overall Insights offering. In this module and the next you will explore some of the Insights capabilities on the Hybrid Cloud Console.
You will start by evaluating common vulnerabilities and exposures (CVEs) that are present in your environment and on your system using the Insights vulnerability service.
There are thousands of CVEs - Insights helps you to focus on CVE information that pertains to Red Hat systems and some CVEs have gone through additional evaluation to share impact specific to the version of RHEL your system is running.
-
Please use a web browser to navigate to the Hybrid Cloud Console .
-
Log into the Hybrid Cloud Console with the following credentials:
User:
lab-434C
Password:
R3dh4t2025!
-
On the main page locate the
Red Hat Enterprise Linux
tile in the upper left and click Insights for RHEL.
-
On the left hand navigation bar go to
Security → Vulnerability → CVEs
Depending on your screen resolution the left hand navigation bar may automatically minimize. You may need to click the hamburger menu (3 lines stacked on top of each other) in the upper left corner in order to see the menu bar. |
The summary bar at the top of the page helps you focus on the most impactful issues in your environment. If you have a high number of CVEs in your environment, this summary bar highlights the biggest risks that you should likely focus on addressing first. Clicking on any of the numbers in the summary bar will apply filters that will show you these CVEs.
The numbers you see may not match what is shown in the screenshot above. That is expected. |
Here is an explanation of the items in the summary bar:
-
CVEs with known exploits
indicate unpatched CVEs with known public exploits. CVEs with this label should be addressed with high priority due to the risks posed by them. "Known exploit" does not mean we have taken steps to determine if the CVE has been exploited in your environment. -
CVEs with security rules
indicate CVEs that have gone through the "Product Security Incident Response Plan" that takes a deeper look at impactful CVEs and adds deep threat intelligence on how the vulnerability impacts Red Hat systems. This could include things like executive summaries, alternative mitigation strategies, and related CVEs that need to be considered. Insights takes this information and makes it more succinct through the use of what we call security rules. -
CVEs with critical severity
. Critical ratings are given to flaws that could be easily exploited by a remote unauthenticated attacker and lead to system compromise (arbitrary code execution) without requiring user interaction. These are the types of vulnerabilities that can be exploited by worms. -
CVEs with important severity
. Important ratings are given to flaws that can easily compromise the confidentiality, integrity, or availability of resources. These are the types of vulnerabilities that allow local users to gain privileges, allow unauthenticated remote users to view resources that should otherwise be protected by authentication, allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service.
The default view also applies a number of filters.
-
The first filter chips show you only CVEs that affect
1 or more systems
in your infrastructure. This could be a Conventional (RPM-DNF based) system or an Immutable (OSTree based) system. -
The second filter only shows you CVEs with an
Advisory Available
. That means you are looking at vulnerabilities that you can fix.
Combining these two filters together means that the initial focus is on CVEs that are affecting your system AND CVEs that you can remediate.
List all systems with a specific CVE
Let’s say your security team knows about a vulnerability that affects SQLlite3 and they want to know if we have any systems with this vulnerability. The CVE number is CVE-2023-7104
.
From the vulnerability page the default filter is CVE (located to the right of the empty checkbox in the image above). You can type the CVE number in the search box OR even a common search term that might be present in the CVE description like sqlite
.
-
In the search box type
7104
. -
This will return
CVE-2023-7104
(as well as others). + Notice that a new filter chip has been added forSearch term: 7104
-
In the row with the CVE ID you will see basic information about the CVE including the number of systems that are impacted by the CVE.
-
Click on the CVE ID for CVE-2023-7104
The next few steps will reference the number in the screenshot above - not the number you see in your environment. You will see a different number and that is expected! |
In the image above you will see that this CVE impacts 37 total systems in the environment. You will have a different number.
Some of these are conventional systems. If you were to click the ‘Immutable (OSTree)` tab there would be additional systems.
In the upper right of the page you will see a Business risk
and a Status
. In the screenshot above they are shown as Not defined
and Not reviewed
respectively.
You may see a different Business risk or Status than Not defined or Not reviewed . That is ok.
|
Business risk
is intended for you to be able to define a risk that is specific to your business - this CVE is tagged with a severity of moderate, but if you have a workload that is deeply affected by this vulnerability, then this may be a more critical issue for you.
-
Click
Actions
in the upper right. You will have the option toEdit business risk
. Click this option.
You can set the business risk to:-
Critical
-
High
-
Medium
-
Low
-
Not defined
-
You can also add a justification note as to why you set the business risk.
-
Click
Cancel
so that you make no changes at this time.
You aren’t making any changes so that you don’t impact what other people taking the lab might see. If you change the status of the CVE then it will change for other people. |
-
Similarly, click
Actions
in the upper right. You will have the option toEdit status
. Click this option.
You can use the status field to identify where you are in the mitigation process.
Status options are:-
Not reviewed
-
In review
-
On-hold
-
Scheduled for patch
-
Resolved
-
No action - risk accepted
-
Resolved via mitigation
-
You can also add a justification note to indicate any details about the status that you select.
-
Click
Cancel
so that you make no changes at this time. -
Locate the export button (just to the right of the
Plan remediation
button). It looks like this:
-
Click the export button which will give you the option to export this list into CSV or JSON formats.
You should know that the exported data is WYSIWYG (what you see is what you get), so an export on theConventional (RPM-DNF)
tab will show you only the RPM/DNF based systems. If you apply any filters to the view, those filters will affect what is exported.
In other words, getting a list of systems impacted by a vulnerability takes just seconds - search for the CVE then export the list of impacted systems.
Generating a remediation playbook
To fix this issue you will need to create a remediation plan for this CVE.
-
Find and locate your system, then click the checkbox to the left of your system’s name.
Reminder: your system name is:node-{guid}-1.example.com
The following steps are for Conventional (RPM-DNF) based systems. Immutable (OSTree) systems are image based and you update the image vs making system changes. |
-
Once you have hosts selected, click the
Plan remediation
button which will launch a wizard that will create a playbook for you.
You can add this fix to an existing playbook or you can create a new playbook. Insights defaults to Create new playbook. -
Give your playbook a name like:
7104 fix {guid}
Reminder: your system name is: node-{guid}-1.example.com
Please add some sort of unique identifier to the playbook name. Above we suggest using your environment’s unique ID even if you are selecting multiple hosts. |
-
Click
Next
.
At this time you are fixing this issue on all affected systems. -
Click
Next
.
Review the summary. Notice that a reboot is required to resolve this issue.
You do have the option to disable the reboot in the playbook by clicking theTurn off autoreboot
text with a blue toggle. -
Click
Submit
.
At the bottom of the wizard there is a link that will allow you toOpen playbook 7104 fix {guid}
. -
Click the link. This will redirect you to the Remediations section of the Hybrid Cloud Console.
For context, in the left hand navigation bar you have just been redirected toAutomation Toolkit → Remediations
.
From the remediations page, while looking at your remediation plan you created, you have a couple of options in the upper right.
The Execute playbook
button is unavailable. Your user in this lab does not have permission to execute remediation. No user gets this permission by default - it has to be explicitly provided, With so many people taking this lab at the same time we have opted to not enable this feature.
We do have an interactive demo that can show you how this works, end to end that will be at the end of this module.
-
Click the Download playbook button.
The playbook is downloaded via your browser. You will need to extract the file then open the .yaml.
This playbook can help simplify the resolution of this issue - you could easily adapt this to run via ansible automation or sync this playbook with Ansible Automation Platform (AAP) - this is covered in the AAP documentation but we are not covering it in this lab. -
Close the playbook and return to the Hybrid Cloud Console browser window.
List all CVEs impacting your system
Let’s return to the vulnerability page and look at your specific host with the goal of getting a list of all CVEs that affect your specific host.
Depending on your screen resolution the left hand navigation bar may automatically minimize. You may need to click the hamburger menu (3 lines stacked on top of each other) in the upper left corner in order to see the menu bar. |
-
On the left hand navigation bar go to
Security → Vulnerability → Systems
-
Locate your host and click on the hostname.
Reminder: your system name is:node-{guid}-1.example.com
This view will show you all of the vulnerabilities present on this specific host. -
Notice that the default filter applied is
Advisory: Available
.
This means we are showing you all CVEs that have an advisory available (in other words - we are showing you all of the vulnerabilities that you can fix).
Because we are showing you only CVEs with advisories, in the remediation column on the far right, almost every CVE has the option for a remediation playbook - meaning Insights can generate a playbook for almost all of these CVEs.
If you just need the list of CVEs that you can fix - exporting this list will get you what you need.
However, sometimes you need a complete list of system vulnerabilities - the CVEs with and without errata.
Insights can show you this information as well. -
Take note of the number of CVEs listed for the host. These are shown in the upper right side of the list of CVEs.
In the image below there are 1241 CVEs with errata on the host in the image - the number you see may differ.
-
Now - click the
x
to the right of theAdvisory: Available
filter chip to remove it.
This will show you all CVEs in the database that affect this system - with and without advisories. -
Look again at the number of CVEs - the number is significantly larger, probably more than double!
In the image below there are 3440 CVEs when looking at the full picture - these are CVEs with and without errata. Having this information gives us a full view of all of the issues that affect your RHEL hosts - the ones you can fix as well as the ones you can’t.
The advisory column will tell you if the CVE has an advisory available to resolve the CVE.
-
Click the export button (just to the right of the Plan remediation button) you have the option to export this list into CSV or JSON formats.
Again - you can get a list of all of the CVEs that impact a specific system very quickly.
Reporting on CVEs
The vulnerability service has some built in reporting capability - you will finish up this module by generating some reports.
-
On the left hand navigation bar go to
Security → Vulnerability → Reports
There are two types of reports - an executive report and a customizable CVE report. -
Start with the executive report - click
Download PDF
.
The PDF file will be downloaded via your browser. -
Locate and open the report.
The executive report shows you a summary of the systems, CVEs, and security rules.
The report then breaks down the CVEs by CVSS (Common Vulnerability Scoring System) score, identifies the top 3 CVEs in your environment, and the top 3 security rules.
This is a nice pre canned report that you can send to your management or security team. -
Close the report and return to the reports page of the Hybrid Cloud Console.
The information in the executive report may not exactly meet your needs, which is where the customizable report comes in.
Let’s say you have been asked to provide your security team with a list of all vulnerabilities with a CVSS score from 6-10 that have been released in the last 90 days.
-
Under
Report by CVEs
clickCreate report
.
This opens a window where you can identify what you want the report to contain.
-
Complete the report wizard
-
If desired you can change the
Report title
. -
Locate the
CVSS base score
filter and change this to read 6.0 - 10 (you can type in the number or use the arrows). -
Locate
Publish date
and select theLast 90 days
. -
Add
User notes
if desired. -
Click
Export report
.
The PDF file will be downloaded via your browser.
-
-
Locate and open the report.
This report will show you the information that you selected - in this case all CVEs with a CVSS base score between 6.0 and 10 within the last 90 days. -
When finished reviewing, close the report and return to the Hybrid Cloud Console.
If you want to see this work end-to-end including the remediation, please check out this interactive demo on Evaluating systems for Common Vulnerabilities and Exposures (CVEs):
This module is complete.