Define any of the following query parameters to filter the results returned.
Name
Description
Example
Required / Optional
top
Numeric. Determine how many top-scored CVEs to get for each device IP address.
/api/v1/devices/cves?top=50
/api/v1/devices/<ipAddress>/cves?top=50
Optional. Default = 100
Type: JSON
JSON array of device CVE objects, or the following failure message:
Message
Description
Failure – error
Operation failed
Success response fields
Name
Type
Nullable / Not nullable
List of values
cveId
String
Not nullable
A canonical, industry-standard ID for the given CVE.
ipAddress
String
Not nullable
IP addresses
score
String
Not nullable
A CVE score, between 0.0 - 10.0
attackVector
String
Not nullable
Network, Adjacent Network, Local, or Physical
description
String
Not nullable
-
Response example
[
{
"cveId": "CVE-2007-0099",
"score": "9.3",
"ipAddress": "10.35.1.51",
"attackVector": "NETWORK",
"description": "Race condition in the msxml3 module in Microsoft XML Core
Services 3.0, as used in Internet Explorer 6 and other
applications, allows remote attackers to execute arbitrary
code or cause a denial of service (application crash) via many
nested tags in an XML document in an IFRAME, when synchronous
document rendering is frequently disrupted with asynchronous
events, as demonstrated using a JavaScript timer, which can
trigger NULL pointer dereferences or memory corruption, aka
\"MSXML Memory Corruption Vulnerability.\""
},
{
"cveId": "CVE-2009-1547",
"score": "9.3",
"ipAddress": "10.35.1.51",
"attackVector": "NETWORK",
"description": "Unspecified vulnerability in Microsoft Internet Explorer 5.01
SP4, 6, 6 SP1, and 7 allows remote attackers to execute
arbitrary code via a crafted data stream header that triggers
memory corruption, aka \"Data Stream Header Corruption
Vulnerability.\""
}
]
Define the following query parameter to filter the results returned.
Name
Description
Example
Required / Optional
top
Numeric. Determine how many top-scored CVEs to get for each device IP address.
/api/v1/devices/cves?top=50
/api/v1/devices/<ipAddress>/cves?top=50
Optional. Default = 100
Type: JSON
JSON array of device CVE objects, or the following failure message:
Message
Description
Failure – error
Operation failed
Success response fields
Name
Type
Nullable / Not nullable
List of values
cveId
String
Not nullable
A canonical, industry-standard ID for the given CVE.
ipAddress
String
Not nullable
IP addresses
score
String
Not nullable
A CVE score, between 0.0 - 10.0
attackVector
String
Not nullable
Network, Adjacent Network, Local, or Physical
description
String
Not nullable
-
Response example
[
{
"cveId": "CVE-2007-0099",
"score": "9.3",
"ipAddress": "10.35.1.51",
"attackVector": "NETWORK",
"description": "Race condition in the msxml3 module in Microsoft XML Core
Services 3.0, as used in Internet Explorer 6 and other
applications, allows remote attackers to execute arbitrary
code or cause a denial of service (application crash) via many
nested tags in an XML document in an IFRAME, when synchronous
document rendering is frequently disrupted with asynchronous
events, as demonstrated using a JavaScript timer, which can
trigger NULL pointer dereferences or memory corruption, aka
\"MSXML Memory Corruption Vulnerability.\""
},
{
"cveId": "CVE-2009-1547",
"score": "9.3",
"ipAddress": "10.35.1.51",
"attackVector": "NETWORK",
"description": "Unspecified vulnerability in Microsoft Internet Explorer 5.01
SP4, 6, 6 SP1, and 7 allows remote attackers to execute
arbitrary code via a crafted data stream header that triggers
memory corruption, aka \"Data Stream Header Corruption
Vulnerability.\""
}
]
Boolean. Defines whether the device has a dynamic address or not.
Not nullable
- true: Device has a dynamic address - false: Device does not have a dynamic address
Supported operatingSystem values
This section lists the supported values for the operatingSystem response field.
Windows 10
Windows 10 32
Windows 10 64
Windows 2000
Windows 7
Windows 7 32
Windows 7 64
Windows 8
Windows 8 32
Windows 8 64
Windows 8.1
Windows 8.1 32
Windows 8.1 64
Windows NT
Windows Server 2003
Windows Server 2003 R2
Windows Server 2008
Windows Server 2008 32
Windows Server 2008 64
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Vista
Windows Vista 32
Windows Vista 64
Windows XP
Mac OS
Mac OS X
Linux
Windows Server 2019
HP UX
Windows 11
Windows 11 32
Windows 11 64
Supported type values
This section lists the supported values for the type response field.
Engineering Station
PLC
Historian
HMI
Domain Controller
DB Server
Wireless Access Point
Router
Switch
Workstation
Server
IP Camera
Printer
Multicast/Broadcast
Internet
Firewall
Terminal Station
VPN Gateway
Group
IED
DCS Controller
RTU
NTP Server
Storage
Industrial Packaging System
Industrial Scale
Industrial Robot
Slot
Punch Clock
ATM
Smart TV
Game console
DVR
Door Control Panel
HVAC
Thermostat
Fire Alarm
Smart Light
Smart Switch
Fire Detector
IP Telephone
Alarm System
Alarm Siren
Smart Phone
Tablet
Wifi Pineapple
Motion Detector
Elevator
Humidity Sensor
Physical Location
Backup Server
Meter
Barcode Scanner
Uninterruptable Power Supply
Variable Frequency Drive
Robot Controller
Servo Drive
Pneumatic Device
Marquee
People Counter System
Intercom
Turnstile
I/O Adapter
Protocol Converter
KVM
Web Guiding System
Turbine
External Management
Embedded Device
Unknown
Supported fields for the protocols object and protocol name values
This section lists the supported fields for the protocols object in the protocols response field.
Name
Type
Nullable / Not nullable
List of values
id
Numeric. Defines the protocol's internal ID.
Not nullable
-
name
String. Defines the device name.
Not nullable
For more information, see below.
Note: To extend Defender for IoT support to proprietary protocols, create a Horizon plugin. For more information, see Extend support to proprietary protocols.
ipAddresses
JSON array of strings of protocol IP addresses.
Not nullable
-
The following values are supported as protocol names out-of-the-box:
Unknown
DNP3
MODBUS
C37.118
SSH
HTTP
SYSLOG
GENERIC
ICMP
DNS
GOOSE
MMS
MALFORMED
IEC-60870
OPC UA
Siemens S7
ARP
Sampled Values
EtherNet/IP
Siemens S7 Plus
Motorola MDLC
Netbios Name Service
Netbios Datagram Service
Lightweight Access Point
CAPWAP
SNMP
DTLS
TNS
Database
SRTP
RPC
OPC
DF-1
DH-485
TDS
SMB
Suitelink
ControlNet
FTP
CDP
Profinet DCP
Profinet Real-Time
LLDP
Telnet
DeltaV
BACNet
AMS
TwinCAT
Ovation ADMD
Ovation SSRPC
Ovation DPUSTAT
Port Map
STP
Telvent OASyS Tags
Mitsubishi MELSEC
Honeywell Control Data Access
ARP
Yokogawa HIS Equalize
Emerson OpenBSI
Siemens SICAM
Omron FINS
Toshiba Computer Link
Foxboro I/A
Yokogawa VNet/IP
Emerson ROC
ABB Totalflow
Siemens Process Historian Discovery
Siemens WinCC Agent
LonTalk
Common ASCII Message
CodeSys
SAIA S-Bus
MDNS
Bently Nevada
Supported firmware fields
This section lists the supported fields for the firmware object in the firmware response field.