Views:

Find out which clusters host containers with vulnerabilities detected by Runtime Scanning.

Runtime Scanning can detect vulnerabilities in your existing clusters. Once a vulnerability is detected on a container, the detection displays. Switch between the Kubernetes and Amazon ECS tabs to view the desired results.
Note
Note
Runtime Vulnerability Scanning does not support the deprecated Docker Image Format v1. Use Docker Image Format v2 and OCI compliant container images.

Fix availability status

Vulnerabilities can have one of the following statuses, depending on their state. If a vulnerability is already fixed, the fix version is displayed instead.
Fix availability
Description
Fixed (displayed as the fixed version)
A newer version of the component is available with a fix for this vulnerability. Upgrading to the any of the listed versions fixes the vulnerability.
Not fixed
There is currently no available version of the component to address the vulnerability.
Unknown
Not enough information is currently available to determine a fix version for this component.
Won't fix
This vulnerability is not fixed and there are no plans to create a fix for this component.
The following table outlines the actions available in the Vulnerabilities tab.
Action
Description
Filter the displayed data
Use the Filter by and Severity drop-downs to locate specific vulnerabilities in the list.
Locate the affected clusters
Click the Cluster link to redirect and locate the cluster in Container Security.
Export a list of vulnerabilities
Click the Export button to create and download a .CSV file listing all the vulnerabilities on the page.
View CVE information
Select a detection in the list and click the CVE link under the table to view more information about the CVE in the National Vulnerability Database.