deprecated

Vulnerability Management: Deprecation of List Vulnerabilities Parameters

Tenable has deprecated the following List vulnerabilities query parameters:

  • age
  • authenticated
  • exploitable
  • resolvable
  • severity

This update affects the following endpoint:

API EndpointNameChange
GET /workbenches/vulnerabilitiesList vulnerabilitiesRemoved the age, authenticated, exploitable, resolvable, and severity query parameters.

Tenable recommends that you update your integrations to use the following alternative custom workbench filters instead:

Query ParameterAlternative Custom Filter
ageUse the following format to filter vulnerabilities by a specific age:
filter.0.filter=plugin.attributes.vuln_publication_date&filter.0.quality=[date-lt, date-lte, date-gt, date-gte, date-eq, date-neq]&filter.0.value=[YYYY/MM/DD]

For example, to filter vulnerabilities that are older than 2024/01/01, use the following filter:
filter.0.filter=plugin.attributes.vuln_publication_date&filter.0.quality=date-lt&filter.0.value=2024/01/01
authenticatedYou can use any combination of the following filters to filter vulnerabilities that require authentication.

To filter for vulnerabilities with a local plugin type, use the following filter:
filter.0.filter=plugin.attributes.plugin_type&filter.0.quality=eq&filter.0.value=local

To filter for CVSSv2 vulnerabilities with local attack vectors, use the following filter:
filter.0.filter=plugin.attributes.cvss_vector.raw&filter.0.quality=match&filter.0.value=AV:L

To filter for CVSSv3 vulnerabilities with local attack vectors, use the following filter:
filter.0.filter=plugin.attributes.cvss3_vector.raw&filter.0.quality=match&filter.0.value=AV:L

To filter for both CVSSv2 and CVSSv3 vulnerabilities with local attack vectors, use the following filter:
filter.0.filter=plugin.attributes.cvss_vector.raw&filter.0.quality=match&filter.0.value=AV:L&filter.1.filter=plugin.attributes.cvss3_vector.raw&filter.1.quality=match&filter.1.value=AV:L&filter.search_type=or
exploitableYou can use any combination of the following filters to filter exploitable vulnerabilities.

To filter for vulnerabilities that have an exploit available, use the following filter:
filter.0.filter=plugin.attributes.exploit_available&filter.0.quality=eq&filter.0.value=true

To filter for vulnerabilities that have an exploit available based on ease of exploitability, use the following filter:
filter.0.filter=plugin.attributes.exploitability_ease.raw&filter.0.quality=eq&filter.0.value="Exploits are available"
resolvableNo equivalent filter is available.
severityUse the following format to filter vulnerabilities by a specific severity:
filter.0.filter=severity&filter.0.quality=[eq, neq]&filter.0.value=[Info, Low, Medium, High, Critical]

For example, to filter vulnerabilities marked as critical severity, use the following filter:
filter.0.filter=severity&filter.0.quality=eq&filter.0.value=Critical

For more information about workbench filter parameters and formatting, see Workbench Filters.