{"id":68418,"date":"2023-06-26T16:40:03","date_gmt":"2023-06-26T08:40:03","guid":{"rendered":"https:\/\/version-2.com\/?p=68418"},"modified":"2023-06-26T16:43:22","modified_gmt":"2023-06-26T08:43:22","slug":"the-limitations-of-vulnerability-scanners-for-cyber-asset-management","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/06\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\/","title":{"rendered":"The limitations of vulnerability scanners for cyber asset management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"68418\" class=\"elementor elementor-68418\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"mr-4 ml-4 pb-5 mb-5 mt-0 blog-body\"><p>Keeping assets safe is a big part of security programs. But how can you keep your assets safe if you don\u2019t even know about them? That\u2019s where asset inventory comes in. Some people try to build an asset inventory using vulnerability scanners. Others combine that vulnerability data with information about their <a href=\"https:\/\/www.runzero.com\/blog\/why-unmanaged-devices\/\" target=\"_blank\" rel=\"noopener\">unmanaged assets<\/a>, even orphaned and rogue devices. That\u2019s what cyber asset attack surface management (CAASM) or cyber asset management is about.<\/p><p><img decoding=\"async\" src=\"\/img\/posts\/magnifying-glass-matrix.png\" alt=\"Magnifying glass looking at the matrix\" width=\"100%\" \/><\/p><h2 id=\"how-vulnerability-scanners-fail-at-asset-inventory\">How vulnerability scanners fail at asset inventory <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>Theoretically, security teams can scan their entire local network for vulnerabilities. In practice, it\u2019s too difficult operationally. Let\u2019s dig into this.<\/p><ol style=\"font-size: 1.1rem; margin-top: 2rem;\"><li style=\"margin-bottom: 1rem;\"><strong>Corporate IoT and OT equipment<\/strong><br \/>Many vulnerability scan configurations exclude IoT and OT devices. Offices contain many IoT devices like your printers, thermostats, and surveillance cameras. Robotic arms, biomedical devices, and traffic signs are examples of operational technology (OT) devices. They often rely on archaic or uncommon network stacks that can\u2019t handle unexpected input from an aggressive security probe. The device easily freezes or crashes, so security teams exclude them from most vulnerability scans. Some vulnerability scanners are smart enough to detect and automatically exclude fragile devices, but in doing so they also leave a gap in the asset inventory.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Long scan times<\/strong><br \/>Vulnerability scanners need to cover hundreds of thousands of exposures, each of which requires time and bandwidth to complete. Extrapolate this requirement to your entire enterprise and it\u2019s not a surprise that some vulnerability scans can take weeks to complete. These slow scan cycles lead to stale asset data, and becomes even more so when a scan needs to be split across multiple maintenance windows.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Phantom assets<\/strong><br \/>Some vulnerability scanners have trouble differentiating between a response from an actual device and an intermediate firewall response or proxy reflecting the traffic. You end up with non-existent devices in your inventory, sometimes even with operating system details.<\/li><\/ol><p>The point of cyber asset management is to have a full and accurate inventory of what is connected to your network, from IT to OT, cloud to remote devices. If your data is incomplete or inaccurate, it\u2019s just a list of some assets, not an inventory. Leading vulnerability scanners do not provide a full, accurate, current asset inventory in everyday practice.<\/p><h2 id=\"insufficient-details-from-credential-less-vulnerability-scans\">Insufficient details from credential-less vulnerability scans <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>Many vulnerability scanners support a discovery-only mode, or \u201chost discovery mode\u201d, that avoids using credentials and security probes. While it avoids using credentials, is faster, and can uncover more unmanaged devices, the results are only marginally better than an ICMP response.<\/p><p>Here\u2019s an example of device details detected by a discovery-only scan of a leading vuln scanner:<\/p><ul style=\"font-size: 1.1rem; margin: 2rem 0;\"><li><b>IPv4 address<\/b>: <code>192.168.40.248<\/code><\/li><li><b>MAC address<\/b>: <code>00:0c:29:59:c4:65<\/code><\/li><li><b>Public<\/b>: No<\/li><li><b>First seen<\/b>: 05\/24\/2023 10:39AM<\/li><li><b>Last seen<\/b>: 05\/24\/2023 10:39AM<\/li><\/ul><p>It essentially only includes the IP and MAC addresses of the discovered device \u2013 not enough information to be useful for asset inventory.<\/p><h2 id=\"potential-limitations-of-vulnerability-scanners-for-managed-devices\">Potential limitations of vulnerability scanners for managed devices <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>Vulnerability scanners are a giant collection of security probes you hope can find all the vulnerabilities before the adversary. A vulnerability scanner should be able to collect a ton of information on the devices it can log into. However, vulnerability scanners are not purpose-built for asset inventory and don\u2019t collect as much information as you need in a cyber asset inventory.<\/p><p>Here are the details for the same device as above with a standard authenticated scan by the same product:<\/p><ul style=\"font-size: 1.1rem; margin: 2rem 0;\"><li style=\"list-style-type: none;\"><ul style=\"font-size: 1.1rem; margin: 2rem 0;\"><li><b>IPv4 address<\/b>: <code>192.168.40.248<\/code><\/li><li><b>MAC address<\/b>: <code>00:0c:29:59:c4:65<\/code><\/li><li><b>Public<\/b>: No<\/li><li><b>First seen<\/b>: 05\/24\/2023 10:39AM<\/li><li><b>Last seen<\/b>: 05\/24\/2023 10:39AM<\/li><li><b>Installed software<\/b>:<br \/><ul style=\"font-size: 1.1rem; margin: 0.2rem 2rem 0.4rem 1rem;\"><li><code>cpe:\/a:apache:http_server:2.4.41<\/code><\/li><li><code>cpe:\/a:apache:http_server:2.4.99<\/code><\/li><li><code>cpe:\/a:openbsd:openssh:8.2<\/code><\/li><li><code>cpe:\/a:elasticsearch:logstash:7.17.6<\/code><\/li><\/ul><\/li><li><b>Vulnerabilities<\/b>:<br \/><ul style=\"font-size: 1.1rem; margin: 0.2rem 2rem 0.2rem 1rem;\"><li>High, Ubiquiti UniFi Network Log4S\u2026, 10, 9.3, 05\/24\/2023<\/li><li>Medium, TLS Version 1.0 Protocol Det\u2026, , 6.1, 05\/24\/2023<\/li><li>Medium, SSL Certificate Cannot Be Tru\u2026, , 6.4, 05\/24\/2023<\/li><li>Medium, SSL Medium Strength Cipher\u2026, 6.1, 5, 05\/24\/2023<\/li><li style=\"margin-bottom: 0.5rem;\">Medium, SSL Certificate Cannot Be Tru\u2026,, 6.4, 05\/24\/2023<\/li><\/ul><\/li><\/ul><\/li><\/ul><p><i>125 additional vulnerabilities\u2026<\/i><\/p><p>Asset information from this leading scanner includes more details on software and vulnerabilities but few additional asset details, such as exact operating system version or hardware platform.<\/p><p><strong>And the same device scanned by runZero:<\/strong><\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp\" width=\"1246\" height=\"1278\" \/><\/p><div style=\"text-align: center;\"><i>Asset information from runZero includes a wealth of information about the device and individual services.<\/i><\/div><h2 id=\"comparing-scans\">Comparing scans <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>Let\u2019s compare and contrast what each solution found:<\/p><table style=\"margin: 3rem 0;\"><tbody><tr><th>\u00a0<\/th><th style=\"text-align: center; padding: 10px;\">Host Discovery Scan<\/th><th style=\"text-align: center; padding: 10px;\">Full Vuln Scan<\/th><th style=\"text-align: center; padding: 10px;\"><img decoding=\"async\" src=\"\/img\/runZero_logo_vertical.png\" alt=\"runZero\" width=\"80px\" \/><\/th><\/tr><tr><td>First seen<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Last seen<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>IP address<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Secondary IPs<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>MAC address<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Seen by sensor\/scanner<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Device type<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Operating system<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Hardware<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Outlier score<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Vulnerabilities<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Hostnames<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Domain names<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Ownership<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Recent user<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Open ports<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Searchable banners<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Protocols<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Software products<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><tr><td>Upstream switches &amp; ports<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u25cb<\/td><td style=\"text-align: center;\">\u23fa<\/td><\/tr><\/tbody><\/table><p>runZero creates an asset inventory from multiple sources, one of which is its proprietary scanner, which does not require credentials. Though it\u2019s an <strong>unauthenticated<\/strong>, active scanner, it gathers more details than a vulnerability scanner\u2019s <strong>authenticated<\/strong> active scanner because it was purpose-built for asset inventory.<\/p><p>Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong. A large telecom customer used a leading vuln scanner and runZero to scan the same device. The leading vuln scanner fingerprinted it as a CentOS Linux device, but runZero accurately identified it as an F5 load balancer, which happened to be running a CentOS-based firmware. Though the vulnerability scanner was superficially accurate, the shallow detail misled the security team to de-prioritize the risk from that device. A public-facing load balancer and a smart light bulb with a private IP address are meaningfully different for a security team. Knowing the operating system is simply not enough.<\/p><h2 id=\"unintended-risk-exposure-while-verifying-vulnerabilities\">Unintended risk exposure while verifying vulnerabilities <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>Vulnerability scanners must use authenticated active scanners to get onto devices to verify on-box vulnerabilities. Unfortunately, if an adversary has compromised or added any device on the network, they can collect and reuse those credentials for privilege escalation or lateral movement. Limiting the scan scope and only scanning trusted devices makes sense, but that further widens the gaps in your asset inventory.<\/p><h2 id=\"risks-and-uncertainty-due-to-missing-devices\">Risks and uncertainty due to missing devices <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>You can\u2019t even pretend to manage your security posture if you don\u2019t have a full asset inventory. How can you find end-of-life (EOL) devices, insecure configurations, and vulnerabilities if you don\u2019t even know what\u2019s on the network?<\/p><p>Gaps in your asset inventory mean uncertainty. Vulnerability scanners are superb at probing devices to verify the presence of CVEs, as long as you scan everything you should. Scoping scans without knowing where all devices are means you are not scanning your whole network. It is no surprise that the assets missed by vulnerability scans are often unmanaged devices that are behind on patches; after all, the scanner doesn\u2019t have the credentials to authenticate to them so it cannot do a full assessment. These are the types of devices that an adversary hunts for when looking for a foothold in the environment.<\/p><h2 id=\"caasm-solutions-leverage-vulnerability-data-but-go-far-beyond\">CAASM solutions leverage vulnerability data but go far beyond. <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>You now understand why vulnerability scanners alone cannot answer the question of asset inventory. However, they can be part of the solution.<\/p><p><a href=\"https:\/\/www.runzero.com\/solutions\/use-case\/cyber-asset-attack-surface-management\/\" target=\"_blank\" rel=\"noopener\">CAASM solutions<\/a> combine vulnerability data with other sources:<\/p><ul><li><strong>Corporate security solutions via APIs<\/strong>: Many CAASM solutions integrate with EDR, MDM, vulnerability management solutions, and even productivity tools such as Google Workspace to cover all managed devices.<\/li><li><strong>Modern network scanners<\/strong>: Some of the best CAASM solutions also use specialized network scanners optimized for asset inventory to find unmanaged IT and OT devices.<\/li><\/ul><p>As a best practice, all organizations should scan for vulnerabilities wherever possible, prioritize quickly, and remediate them swiftly. An effective vulnerability management program is an essential defensive undertaking for any mature security organization. A full asset inventory stands alongside vulnerability scanning as a core component of the overall program. Learn more about <a href=\"https:\/\/www.runzero.com\/blog\/strengthen-vm\/\" target=\"_blank\" rel=\"noopener\">how asset inventory can improve vulnerability management<\/a>.<\/p><h3 id=\"a-cyber-asset-management-solution-that-covers-assets-from-it-to-ot-cloud-to-remote-devices\">A cyber asset management solution that covers assets from IT to OT, cloud to remote devices <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>runZero is a cyber asset management solution that includes CAASM functionality. It combines integrations with vulnerability management and other sources with a proprietary network scanner that is fast and safe even on fragile IoT and OT networks.<\/p><p>runZero scales up to millions of devices, but it\u2019s easy to try. The <a href=\"https:\/\/www.runzero.com\/try\/signup\/\" target=\"_blank\" rel=\"noopener\">free 21-day trial<\/a> even downgrades to a free version for personal use or organizations with less than 256 devices. <strong>Find out what\u2019s connected to your network in less than 20 minutes.<\/strong><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Keeping assets safe is a big part of security programs. [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1075,61],"tags":[977,1076],"class_list":["post-68418","post","type-post","status-publish","format-standard","hentry","category-runzero","category-year2023","category-press-release","tag-runzero","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The limitations of vulnerability scanners for cyber asset management - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The limitations of vulnerability scanners for cyber asset management - Version 2\" \/>\n<meta property=\"og:description\" content=\"Keeping assets safe is a big part of security programs. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-26T08:40:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-26T08:43:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The limitations of vulnerability scanners for cyber asset management\",\"datePublished\":\"2023-06-26T08:40:03+00:00\",\"dateModified\":\"2023-06-26T08:43:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\\\/\"},\"wordCount\":1347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/asset-information-screenshot.webp\",\"keywords\":[\"runZero\",\"2023\"],\"articleSection\":[\"runZero\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/\",\"name\":\"The limitations of vulnerability scanners for cyber asset management - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/asset-information-screenshot.webp\",\"datePublished\":\"2023-06-26T08:40:03+00:00\",\"dateModified\":\"2023-06-26T08:43:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/asset-information-screenshot.webp\",\"contentUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/asset-information-screenshot.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-vulnerability-scanners\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The limitations of vulnerability scanners for cyber asset management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The limitations of vulnerability scanners for cyber asset management - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/","og_locale":"zh_HK","og_type":"article","og_title":"The limitations of vulnerability scanners for cyber asset management - Version 2","og_description":"Keeping assets safe is a big part of security programs. [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/","og_site_name":"Version 2","article_published_time":"2023-06-26T08:40:03+00:00","article_modified_time":"2023-06-26T08:43:22+00:00","og_image":[{"url":"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/06\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The limitations of vulnerability scanners for cyber asset management","datePublished":"2023-06-26T08:40:03+00:00","dateModified":"2023-06-26T08:43:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/06\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\/"},"wordCount":1347,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp","keywords":["runZero","2023"],"articleSection":["runZero","2023","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/06\/the-limitations-of-vulnerability-scanners-for-cyber-asset-management\/","url":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/","name":"The limitations of vulnerability scanners for cyber asset management - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#primaryimage"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp","datePublished":"2023-06-26T08:40:03+00:00","dateModified":"2023-06-26T08:43:22+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#primaryimage","url":"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp","contentUrl":"https:\/\/www.runzero.com\/img\/posts\/asset-information-screenshot.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/limits-vulnerability-scanners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The limitations of vulnerability scanners for cyber asset management"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hNw","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=68418"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68418\/revisions"}],"predecessor-version":[{"id":68425,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68418\/revisions\/68425"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=68418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=68418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=68418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}