Skip to main content
With plerion vulnerabilities, you can query vulnerabilities across your cloud assets and manage vulnerability exemptions.
For more about vulnerabilities in the Plerion dashboard, see Vulnerabilities.

Synopsis

plerion vulnerabilities <subcommand> [options]

Subcommands

list

List vulnerabilities with filtering.
plerion vulnerabilities list [options]

Options

FlagTypeDescription
--severitystringCRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL (comma-separated)
--providerstringCloud provider: AWS, Azure, GCP, Kubernetes (case-insensitive)
--has-kevflagOnly CISA Known Exploited Vulnerabilities
--has-exploitflagOnly vulnerabilities with known exploits
--has-vendor-fixflagOnly vulnerabilities with a vendor fix available
--is-exploitableflagOnly exploitable vulnerabilities
--is-exemptedbooleanFilter by exemption status (true or false)
--asset-idstringFilter by asset ID(s)
--vulnerability-idstringFilter by CVE/vulnerability IDs (comma-separated)
--asset-group-idstringFilter by asset group IDs (comma-separated)
--environment-idstringFilter by environment IDs or names (comma-separated)
--execution-idstringFilter by execution IDs (comma-separated)
--regionstringFilter by cloud region(s)
--integration-idstringFilter by integration IDs
--sort-bystringSort field (e.g. hasKev, severityLevelValue, firstObservedAt)
--sort-orderstringasc or desc
--package-namestringFilter by package name
--target-namestringFilter by target name
--target-typestringFilter by target type
--target-classstringFilter by target class (e.g. lang-pkgs, os-pkgs)
--startstringFirst observed start date (ISO 8601)
--endstringFirst observed end date (ISO 8601)
--per-pagenumberResults per page (max 2000)
--allflagFetch all pages automatically

exemptions list

plerion vulnerabilities exemptions list --profile-id <id> [--per-page N] [--all]
List vulnerability exemptions for a profile.
FlagTypeDescription
--profile-idstring(required) Profile ID or default
--per-pagenumberResults per page (default: 100, max: 1000)
--allflagFetch all pages automatically

exemptions get

plerion vulnerabilities exemptions get --profile-id <id> --id <exemption-id>

exemptions create

plerion vulnerabilities exemptions create --profile-id <id> --name <n> --reason <r> --conditions <json> --audit-note <note>
FlagTypeDescription
--reasonstring(required) Exemption reason. Validated against allowed values (see below)
--conditionsstring(required) Conditions JSON. Must include at least one of: vulnerabilityIds, assetGroupIds, assetIds, assetRegions, assetTags
--audit-notestring(required) Audit note (max 250 chars)
The --conditions, --reason, and --audit-note flags are all required when creating an exemption.

Reason values

ValueDescription
ACCEPTED_RISKRisk has been accepted
COMPENSATING_CONTROLA compensating control is in place
NO_VENDOR_FIXNo vendor fix is available
NOT_IN_USEThe vulnerable component is not in use
OTHER_REASONSOther reasons (provide details in name)

exemptions update

plerion vulnerabilities exemptions update --profile-id <id> --id <exemption-id> [--name <n>] [--reason <r>] [--audit-note <note>] [--conditions <json>]
FlagTypeDescription
--audit-notestringUpdated audit note
--conditionsstringUpdated conditions (JSON)

exemptions delete

plerion vulnerabilities exemptions delete --profile-id <id> --id <exemption-id>

Examples

# Critical vulnerabilities with known exploits
plerion vulnerabilities list --severity CRITICAL --has-exploit

# CISA KEV list
plerion vulnerabilities list --has-kev --output table

# All critical and high vulnerabilities
plerion vulnerabilities list --severity CRITICAL,HIGH --all --output json > vulns.json

# Create an exemption
plerion vulnerabilities exemptions create \
  --profile-id my-profile \
  --name "Accepted CVE-2022-22965" \
  --reason ACCEPTED_RISK \
  --conditions '{"vulnerabilityIds":["CVE-2022-22965"]}' \
  --audit-note "Accepted risk per security review"

# List exemptions
plerion vulnerabilities exemptions list --profile-id my-profile

# Fetch all exemptions across all pages
plerion vulnerabilities exemptions list --profile-id my-profile --all

# Delete an exemption
plerion vulnerabilities exemptions delete --profile-id my-profile --id ex-abc123

Output columns

Table output includes all fields returned by the API:
ColumnDescription
CVE / IDCVE identifier or Plerion vulnerability ID
TITLEVulnerability title
SEVERITYCRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL
SEVERITY VALUENumeric CVSS-style severity score
SEVERITY SOURCESource of the severity rating
PROVIDERCloud provider
ASSET IDAffected asset ID
ASSET TYPEAsset type
TARGET NAMEAffected package or target name
DESCRIPTIONVulnerability description
PRIMARY URLLink to CVE or advisory
KEVCISA Known Exploited Vulnerability
EXPLOITHas known exploit
FIXVendor fix available
PUBLISHEDPublication date
FIRST OBSERVEDFirst observed timestamp
LAST OBSERVEDLast observed timestamp
INTEGRATION IDIntegration ID
TENANT IDTenant ID
ORG IDOrganization ID
EXECUTION IDScan execution ID
SCHEMA VERSIONAPI schema version

Exemptions output columns

ColumnDescription
IDExemption ID
PROFILE IDProfile the exemption belongs to
NAMEExemption name/description
REASONExemption reason
AUDIT NOTEAuditor note
CREATED BYUser who created the exemption
UPDATED BYUser who last updated the exemption
CREATED ATCreation timestamp
UPDATED ATUpdate timestamp