https://api.bitsighttech.com/ratings/v1/companies/company_guid/findings?risk_vector=patching_cadence
Get an organization’s Patching Cadence finding details.
Parameters
For details specific to Patching Cadence, use the ?risk_vector=patching_cadence
parameter. Other query parameters are listed in GET: Finding Details.
Example Request
curl https://api.bitsighttech.com/ratings/v1/companies/a940bb61-33c4-42c9-9231-c8194c305db3/findings?risk_vector=patching_cadence -u api_token:
Example Response
{ "links":{ "next":null, "previous":null }, "count":18, "results":[ […] { "temporary_id":"A9Jq47BBje3d147963774e284e3ddcc6542edbfbb0", "affects_rating":true, "assets":[ { "asset":"23.4.136.143", "identifier":null, "category":"low", "importance":0.0, "is_ip":true } ], "details":{ "cvss":{ "base":[ 3.4 ] }, "check_pass":"", "diligence_annotations":{ "remediation_dates":[ { "first":"2019-03-06 12:59:09", "last":"now" } ], "is_remediated":false }, "remediations":[ { "message":"CVE-2014-3566 (POODLE)", "help_text":"The SSLv3 protocol, as used in OpenSSL through 1.0.1i and other products, makes it easier for Man-in-the-middle (MITM) attackers to obtain cleartext data via a padding-oracle attack (a.k.a. POODLE).", "remediation_tip":"Ensure all of your TLS/SSL libraries on the affected machines are up-to-date. Disable SSLv3 support on those servers, as described in <a target=\"new\" href=\"https://disablessl3.com/\">Disable SSLv3</a>." } ], "vulnerability_name":"cve-2014-3566", "vulnerabilities":[ { "name":"CVE-2014-3566", "alias":"POODLE", "display_name":"POODLE", "description":"The SSLv3 protocol, as used in OpenSSL through 1.0.1i and other products, makes it easier for Man-in-the-middle (MITM) attackers to obtain cleartext data via a padding-oracle attack (a.k.a. POODLE).", "remediation_tip":"Ensure all of your TLS/SSL libraries on the affected machines are up-to-date. Disable SSLv3 support on those servers, as described in <a target=\"new\" href=\"https://disablessl3.com/\">Disable SSLv3</a>.", "confidence":"HIGH", "cvss":{ "base":3.4 }, "severity":"Minor" } ], "rollup_end_date":"2023-08-28", "rollup_start_date":"2019-03-06", "searchable_details":"CVE-2014-3566" }, "evidence_key":"23.4.136.143:443", "first_seen":"2019-03-06", "last_seen":"2023-08-28", "related_findings":[ ], "risk_category":"Diligence", "risk_vector":"patching_cadence", "risk_vector_label":"Patching Cadence", "rolledup_observation_id":"wgJohEX15wwNEfyZfyR31A==", "severity":4.3, "severity_category":"moderate", "tags":[ "PrimaryDCHyd", "public" ], "remediation_history":{ "last_requested_refresh_date":"2024-06-19", "last_refresh_status_date":"2024-06-23", "last_refresh_status_label":"failed", "last_refresh_status_reason": "asset_not_found", "last_refresh_reason_code":"asset unreachable", "last_refresh_requester": "1e10564d-fawa-4331-0000-6f7588b55a98", "result_finding_date": null }, "asset_overrides":[ ], "duration":"1637 days", "comments":null, "remaining_decay":292, "remediated":false } ] }
Response Attributes
Field | Description | ||||||
---|---|---|---|---|---|---|---|
linksObject |
Navigation for multiple pages of results. See pagination. | ||||||
nextString |
The URL for navigating to the next page of results. | ||||||
previousString |
The URL for navigating to the previous page of results. | ||||||
countInteger |
The number of findings. | ||||||
resultsArray |
Findings and their details. | ||||||
Object | A finding. | ||||||
temporary_idString |
A temporary identifier for this finding. | ||||||
affects_ratingBoolean |
true = This finding has an impact on the risk vector letter grade. |
||||||
assetsArray |
Asset details. | ||||||
Object | An asset (IP address or domain). | ||||||
assetString |
The asset associated with this finding. | ||||||
identifierString |
This is not applicable to Patching Cadence findings. | ||||||
categoryString |
The Bitsight-calculated asset importance. | ||||||
importanceDecimal |
For internal Bitsight use. | ||||||
is_ipBoolean |
true = This asset is an IP address. |
||||||
detailsObject |
Details of this finding. | ||||||
cvssObject |
If the finding has an associated vulnerability, this contains the CVSS score. | ||||||
baseArray |
CVSS scores of vulnerabilities associated with this finding. | ||||||
check_passString |
For internal Bitsight use. | ||||||
diligence_annotationsObject |
Diligence finding details. | ||||||
remediation_datesArray |
Remediation timeline details. | ||||||
Object | The remediation timeline. | ||||||
firstString [ YYYY-MM-DD HH:MM:SS ] |
The date and time when the finding first appeared. | ||||||
lastString |
When the finding is remediated. | ||||||
is_remediatedBoolean |
true = The finding is remediated. |
||||||
remediationsArray |
Information about the finding and instructions to remediate it, if any. | ||||||
Object | The information. | ||||||
messageString |
Details of this finding. | ||||||
help_textString |
An overview of this finding. | ||||||
remediation_tipString |
The recommended remediation instructions. | ||||||
vulnerability_nameString |
The vulnerability name or CVE ID. | ||||||
vulnerabilitiesArray |
Vulnerabilities affecting the finding. | ||||||
Object | A vulnerability and its details. | ||||||
nameString |
The name of the vulnerability. | ||||||
aliasString |
The vulnerability name if it’s a prominent vulnerability. | ||||||
display_nameString |
The vulnerability name if it’s a prominent vulnerability. | ||||||
descriptionString |
Details about the vulnerability. | ||||||
remediation_tipString |
Remediation and mitigation instructions. | ||||||
confidenceString |
|||||||
cvssObject |
Contains the CVSS score. | ||||||
baseDecimal |
CVSS scores of vulnerabilities associated with this finding. | ||||||
severityString |
The finding severity, which is the measured risk that this finding introduces. | ||||||
rollup_end_dateString [ YYYY-MM-DD ] |
The date when this finding was last observed. | ||||||
rollup_start_dateString [ YYYY-MM-DD ] |
The date when this finding was first observed. | ||||||
searchable_detailsString |
Details that can be searched in the Bitsight platform. | ||||||
evidence_keyString |
The asset attributed to the finding. | ||||||
first_seenString [ YYYY-MM-DD ] |
The date when this observation was first seen. | ||||||
last_seenString [ YYYY-MM-DD ] |
The date when this observation was last seen. | ||||||
related_findingsArray |
Related findings and their details. | ||||||
risk_categoryString |
The risk category of this finding. | ||||||
risk_vectorString |
The slug name of this risk vector. | ||||||
risk_vector_labelString |
The display name of this risk vector. | ||||||
rolledup_observation_idString |
A stable and randomized identifier for findings. It is assigned to a finding when one or more observations with largely similar key properties occur in close succession. | ||||||
severityDecimal |
The finding severity, which is the measured risk that this finding introduces. | ||||||
severity_categoryString |
The finding severity slug name. | ||||||
tagsArray |
Infrastructure tags identifying this asset. | ||||||
remediation_history Object |
If ?expand=remediation_history parameter is set, the remediation history of the finding is included. |
||||||
last_requested_refresh_date String [ |
The date when a finding rescan that included this finding was last requested. | ||||||
last_refresh_status_date String [ |
The date when a rescan of the remediation status of this finding was last requested. | ||||||
last_refresh_status_label String |
The current rescan status of this finding. | ||||||
last_refresh_status_reason String |
The rescan status. | ||||||
last_refresh_reason_code String |
The reason code for the resacn status. | ||||||
last_refresh_requester String [user_guid] |
The unique identifier of the user who requested the rescan. | ||||||
result_finding_date String [YYYY-MM-DD] |
The first seen date of the finding that resulted from the rescan, if applicable. | ||||||
asset_overridesArray |
User-assigned asset importance details. | ||||||
durationString |
This finding’s duration. | ||||||
commentsNull |
Finding comments. | ||||||
remaining_decayInteger |
The remaining finding lifetime. | ||||||
remediatedBoolean |
true = The finding is remediated. |
-
February 28, 2025: Added
last_refresh_status_reason
,last_refresh_reason_code
,last_refresh_requester
, andresult_finding_date
response attributes. - September 7, 2023: Separated from GET Diligence Finding Details; More details on the vulnerability, remediation, and data confidence based on the evidence.
Feedback
0 comments
Please sign in to leave a comment.