Enterprise TruRisk Management Release 1.3.1 API

June 23, 2025

Before understanding the API release highlights, learn more about the API server URL to be used in your API requests by referring to the Know Your Qualys API Server URL section. For this API Release Notes, <qualys_base_url> is mentioned in the sample API requests.

Updated Fields in Response of Download Report Using Resource Name API

With this update, we have improved coverage in reporting columns. The output response of the Download report using resource name API now, has the title, description, impact,  solution and detectionResult along with other existing details.

New or Updated API

Updated

API Endpoints

/etm/api/rest/v1/reports/{report-id}/resources/{resource-name}

Method

GET

DTD or XSD changes

Not Applicable

Here are the details of the updated fields.

Title Enrichment (title)

If the Finding Title is unavailable from the source or the Title has the CVE-ID, then title will be enriched from Qualys CTDB, as long as CTDB has the Title for specific CVE-ID.

Description Enrichment (description)

If the description is unavailable from the source, then description will be enriched from Qualys CTDB, as long as CTDB has a description for specific CVE-ID.

Detection Result Enrichment (detectionResult)

If the detection result is unavailable from the source, it will be enriched from Qualys CTDB, as long as CTDB has the detection result for a specific CVE-ID.

Impact Enrichment (impact)

If the impact is missing from the source, it will be enriched from Qualys CTDB, as long as CTDB  has impact details for the specific CVE-ID.

Solution Enrichment

If the solution is missing from the source, it will enriched from Qualys CTDB, as long as CTDB has a recommendation for the specific CVE-ID.

SampleSample

API Request

curl -X GET '<qualys_base_url>/etm/api/rest/v1/reports/20ce9e32-fe6e-4172-b5ee-ef770591c56b/resources/part_15097524224131306.json'
--header 'Content-Type: application/json' 
--header 'Authorization: Bearer <JWT Token>'

Response

 {
  "cveId": "CVE-2024-49896",
  "assetId": 343748,
  "assetName": "arn:aws:ec2:eu-central-1:984186218765:instance/i-0de56c3fe2da2ed3c",
  "dnsName": "prod-runner-2",
  "assetType": "HOST",
  "findingId": "8ad29d66-152a-4c8b-8240-73b981cc4181",
  "ignored": false,
  "externalFindingId": "8d0b3cbe-ad3e-59ae-8732-4b73f251320a",
  "title": "CVE-2024-49896",
  "vendorProductName": "Wiz",
  "category": "VULNERABILITY",
  "lastFound": 1746443314000,
  "firstFound": 1741084281705,
  "severity": 1,
  "status": "ACTIVE",
  "vendorName": "Wiz",
  "lastUpdated": 1746443314000,
  "isChangeDetected": false,
  "qds": 30,
  "detectionResult": "The package `linux-aws` version `5.4.0-1030.31` was detected in `APT package manager` on a machine running `Ubuntu 20.04.1` is vulnerable to `CVE-2024-49896`, which exists in versions `>= 5.0.0 && < 5.4.0-1140.150`.\n\nThe vulnerability was found in the [Official Ubuntu Security Advisories](https://ubuntu.com/security/CVE-2024-49896) with vendor severity: `Medium` ([NVD](https://nvd.nist.gov/vuln/detail/CVE-2024-49896) severity: `Medium`).\n\nThe vulnerability can be remediated by updating the package to version `5.4.0-1140.150` or higher, using `apt upgrade linux-aws`.",
  "impact": "NA",
  "solution": "apt upgrade linux-aws",
  "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check stream before comparing them\n\n[WHAT & HOW]\namdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is\nnecessary to check for null before dereferencing them.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity.",
  "cve": {
    "cveId": "CVE-2024-49896",
    "qvs": 30,
    "trending": [
      "03312025",
      "04022025",
      "04032025",
      "03182025"
    ],
    "cisaKnownExploits": false,
    "epssScore": 0.00028,
    "updated": 1746188184,
    "cvss2Info": {
      "temporalScore": 5
    },
    "cvss3Info": {
      "basescore": 5.5,
      "temporalScore": 5,
      "accessVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
    }
  }
}

To know more about input parameters and other details, refer to ETM API User guide.