Skip to main content

CVE Tracking Feature

PatchCTL automatically correlates your installed packages with known vulnerabilities.

How It Works

  1. Package Inventory - Agent reports all installed packages
  2. CVE Database - PatchCTL maintains vulnerability data
  3. Correlation - Packages matched against CVE-affected versions
  4. Alerting - New vulnerabilities surfaced in dashboard

CVE Data Sources

  • National Vulnerability Database (NVD)
  • Distribution security advisories (USN, RHSA, SUSE-SU)
  • CVE details and CVSS scores

Data updated daily.

Severity Scoring

Based on CVSS v3 scores:

SeverityCVSS ScoreDescription
Critical9.0 - 10.0Immediate exploitation risk
High7.0 - 8.9Significant risk
Medium4.0 - 6.9Moderate risk
Low0.1 - 3.9Limited risk

Actionable vs Informational

Actionable CVEs:

  • Affect your installed packages
  • Fix available in your repositories
  • Can be remediated by updating

Informational CVEs:

  • Affect packages not installed
  • No fix available yet
  • Require manual investigation

Remediation Workflow

  1. Identify - Review CVEs in dashboard
  2. Prioritize - Focus on Critical/High first
  3. Plan - Schedule remediation
  4. Execute - Apply patches
  5. Verify - Confirm CVE resolved

False Positive Handling

Sometimes packages are flagged incorrectly:

  • Version detection ambiguity
  • Backported security fixes
  • Package renaming

Use "Mark as Reviewed" to dismiss false positives.