Centralized Firewall Management Administration Guide

Table of Contents

Identifying Firewalls Running Vulnerable Firmware

The Inventory page helps you quickly identify firewalls that are running firmware versions with known vulnerabilities. If a firewall is detected as running vulnerable firmware, a vulnerability icon appears next to that device on the Inventory page.

You can group devices based on whether they are running secure or vulnerable firmware at both All Tenants and Tenant levels.

To view vulnerability details

  1. Navigate to Manager View | Firewalls > Inventory page.
  2. Hover over the vulnerability icon to see a quick summary.

  3. Click the vulnerability Title to open detailed information, including:

    • Description of the vulnerability
    • Impact
    • Affected firmware versions and device models
    • Workarounds (if available)
    • Fixed firmware versions

    Upgrade the devices running vulnerable firmware in any one of ways mentioned in Upgrading Firmware.