-
Notifications
You must be signed in to change notification settings - Fork 499
Description
Description
Some errors are observed when ingesting findings from Tenable Vulnerability Management solution.
Tenable uses “Adjacent Network” as the value for the CVSS V3 attack vector, which does not appear to be authorized.
Allow this value or be less strict about the possible values for this field, given that no control has yet been implemented on the platform side.
Traceback (most recent call last): File "/opt/opencti-connector-tenable-vuln-management/tenable_vuln_management/connector.py", line 195, in _process self.converter_to_stix.process_vuln_finding( File "/opt/opencti-connector-tenable-vuln-management/tenable_vuln_management/converter_to_stix.py", line 430, in process_vuln_finding vulnerability_related_objects = self.process_plugin(vuln_finding.plugin) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/opencti-connector-tenable-vuln-management/tenable_vuln_management/converter_to_stix.py", line 392, in process_plugin vulnerabilities = self._make_vulnerabilities(plugin=plugin) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/opencti-connector-tenable-vuln-management/tenable_vuln_management/converter_to_stix.py", line 385, in _make_vulnerabilities [Vulnerability(name=cve, **base, **details) for cve in plugin.cve] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/local/lib/python3.12/site-packages/pydantic/main.py", line 214, in __init__ validated_self = self.__pydantic_validator__.validate_python(data, self_instance=self) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ pydantic_core._pydantic_core.ValidationError: 1 validation error for Vulnerability cvss3_attack_vector Input should be 'NETWORK', 'N', 'Network', 'ADJACENT', 'A', 'Adjacent', 'LOCAL', 'L', 'Local', 'PHYSICAL', 'P' or 'Physical' [type=literal_error, input_value='Adjacent Network', input_type=str] For further information visit https://errors.pydantic.dev/2.10/v/literal_error
Environment
OpenCTI version: 6.5.4