While checking if a vulnerability exists in your environment, take care of the following points:
- Check if the scanning vendor has published a signature to detect the vulnerability. Sometimes a QID/Plugin ID is mapped to the CVE ID but will be in development phase and is not yet published.
- Check if authentication is required to detect the vulnerability. For plugin ID, you can check the type (local/remote), and for QID, the discovery method (Remote Only/Authenticated Only/Remote and Authenticated).
- Sometimes scanning vendors will detect a patch to the vulnerability instead of searching for the vulnerability itself. If the patch is superseded by some other patch which is already installed, then the detection is a false positive.
- Sometimes a feature of a OS will be vulnerable. Check whether the detection logic is checking the OS version for flagging the vulnerability. If this is the case then you will need to check with platform support teams as in the feature is in use or not.
- Ensure scan traffic is not obstructed by firewall (Basically, if you are searching a vulnerability in a system(s), ensure the system(s) are getting scanned properly).
The whole point is, do not just enter QID/Plugin ID in filter, hit enter and based on search results decide whether the vulnerability exists or not. If architecture is scanner based, operationalize troubleshooting authentication issues and if it is agent based, offline agent issues.
Happy Learning !!