Find out which clusters host containers with vulnerabilities detected by Runtime Scanning.
Runtime Scanning can detect vulnerabilities in your existing clusters. Once a vulnerability
is detected on a container, the detection displays. Switch between the Kubernetes and Amazon ECS tabs to view the desired results.
NoteRuntime Vulnerability Scanning does not support the deprecated Docker Image Format
v1. Use Docker Image Format v2 and OCI compliant container images.
|
Fix availability status
Vulnerabilities can have one of the following statuses, depending on their state.
If a vulnerability is already fixed, the fix version is displayed instead.
|
Fix availability
|
Description
|
|
Fixed (displayed as the fixed version)
|
A newer version of the component is available with a fix for this vulnerability. Upgrading
to the any of the listed versions fixes the vulnerability.
|
|
Not fixed
|
There is currently no available version of the component to address the vulnerability.
|
|
Unknown
|
Not enough information is currently available to determine a fix version for this
component.
|
|
Won't fix
|
This vulnerability is not fixed and there are no plans to create a fix for this component.
|
The following table outlines the actions available in the Vulnerabilities tab.
|
Action
|
Description
|
|
Filter the displayed data
|
Use the Filter by and Severity drop-downs to locate specific vulnerabilities in the list.
|
|
Locate the affected clusters
|
Click the Cluster link to redirect and locate the cluster in Container Security.
|
|
Export a list of vulnerabilities
|
Click the Export button to create and download a .CSV file listing all the vulnerabilities on the
page.
|
|
View CVE information
|
Select a detection in the list and click the CVE link under the table to view more
information about the CVE in the National Vulnerability Database.
|
