Today I will share with you a way by which you can ignore 99.9% of vulnerabilities in your environment. Ha ha ... Just kidding.
But on a serious note there are few vulnerabilities which you can suppress. Let's see them one by one.
1. SSL related vulnerabilities on systems in LAN network:
e.g. SSL Certificate Cannot Be Trusted (https://www.tenable.com/plugins/nessus/51192)
e.g. SSL Self-Signed Certificate (https://www.tenable.com/plugins/nessus/57582)
e.g. SSL Certificate with Wrong Hostname (https://www.tenable.com/plugins/nessus/45411)
Reason -> Organizations use use self-signed certificates for systems in LAN.
2. Vulnerabilities which are difficult to exploit due to enforcement of policy
e.g. Microsoft Office Trust Access to VBA Project Model Object Enabled (https://www.tenable.com/plugins/nessus/123461)
Reason -> VBA can be disabled using GPO.
3. Vulnerabilities due to how a OS vendor handles their patching regime and discloses vulnerabilities
e.g. CentOS vulnerabilities on Tenable Core not being mitigated (https://community.tenable.com/s/article/CentOS-vulnerabilities-on-Tenable-Core-not-being-mitigated?language=en_US)
4. In almost all organizations patching on Windows servers is done via various patching tools (not via automatic updates)
e.g. MS KB3119884: Improperly Issued Digital Certificates Could Allow Spoofing (https://www.tenable.com/plugins/nessus/87313)
The plugin was flagged on Windows 2012 R2 servers but was fixed in Windows server 2016
5. Non availability of patches from OS vendors
e.g. Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039) for Windows 10 and Windows 11 OS (https://learn.microsoft.com/en-us/answers/questions/1387774/curl-7-84-(-8-2-1-header-dos-(cve-2023-38039)-for)
(https://www.tenable.com/plugins/nessus/181409)
e.g. Curl 7.69 < 8.4.0 Heap Buffer Overflow (https://www.tenable.com/plugins/nessus/182875)
Reason -> Platform support teams will not update packages from open source projects as it might break things and they will not get vendor support.
I know this is not much but as the saying goes "a little help is worth much more for the wretched". Ultimately you need to use EPSS, CISA KEV, and various threat intel sources for prioritization to reduce actionable vulnerabilities.
Happy Learning !!