In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability information and publications. Today, we have officially launched the Cisco PSIRT openVuln APIand it is available for immediate use.
This API allows technical staff and programmers to build tools that help them do their job more effectively. In this case, it enables them to easily keep up with security vulnerability information specific to their network. That frees up more time for them to manage their network and deploy new capabilities in their infrastructure.
The API also allows Cisco customers and partners to leverage OVAL definitions and CVRF data to set up rules for the automated assessment of their own networks. It further simplifies the evaluation process and reduces the time between when a vulnerability is announced and the fix is actually implemented. That means less risk for them and their own customers tied to open vulnerabilities.
We’ve created the following video tutorial to help customers and partners get started.
Does the Cisco Support Software Suggestions API provide recommendations for Meraki devices? I have not been able to get a positive result, but my results in general with this API have been pretty poor, with what I would consider common PIDs not...
We requested client access token to access the CS-API inventory and customer API's. However, when we attempt to test the API in postman with the client ID and secret we receive a 403 forbidden response. We found this post that looked...