The VulnCheck Exploit Intelligence App for Splunk empowers security teams to enrich CVE data with real-world exploitation intelligence directly inside Splunk. By integrating VulnCheck's comprehensive APIs, the app delivers enriched vulnerability insights, SBOM-driven risk analytics, and threat actor correlation, enabling customers to prioritize vulnerabilities based on active exploitation and real risk, not just static CVSS scores.
| Component | Version/Support |
|---|---|
| Splunk Enterprise | 10.0.x, 9.4.x, 9.3.x, 9.2.x |
| Python Version | Python 3 |
| Operating System | Platform Independent |
| Browser Support | Google Chrome, Mozilla Firefox |
| Deployment Types | Standalone, Distributed, Search Head Clustering, Splunk Cloud |
Standard Splunk Enterprise configuration of Search Head, Indexer and Forwarder.
The VulnCheck Exploit Intelligence App for Splunk can be installed in the following ways:
VulnCheck Exploit Intelligence App for Splunk.VulnCheck Exploit Intelligence App for Splunk.Install app from file.Choose file and select the VulnCheck Exploit Intelligence App for Splunk installation file.Upload.| Parameter | Required | Description |
|---|---|---|
| API Key | Yes | Your VulnCheck API key for accessing threat intelligence APIs |
Configure proxy settings if your environment requires proxy access to external APIs.
| Parameter | Required | Description |
|---|---|---|
| Enable | Optional | Check to enable proxy configuration |
| Proxy Type | Optional | HTTP proxy type (default: http) |
| Host | Optional | Proxy server hostname or IP address |
| Port | Optional | Proxy server port |
| Username | Optional | Proxy authentication username |
| Password | Optional | Proxy authentication password |
Configure automated enrichment of vulnerability data from various sources.
| Parameter | Required | Description |
|---|---|---|
| Enable | Optional | Enable/disable enrichment process |
| Enrich Data For | Yes | Select data type (CVEs, PURLs, CPEs) |
| Data Source | Yes | Source type (Index, Lookup, CIM) |
| Index | Conditional | Splunk index for data source |
| Sourcetype | Conditional | Sourcetype for index-based enrichment |
| Field | Conditional | Field containing values to enrich |
| Other Fields | Optional | Additional fields user wants to include in the enriched data from the source. |
| Lookup | Conditional | Lookup to be used for enrichment |
| Column Name | Conditional | Column Name having values to enrich |
| Other Column Names | Optional | Other column names user wants to add in the enriched data from the source |
| Data Model | Static Value | Data model from which the data will be searched and enriched |
| Data Model Field | Static Value | Data Model field that contains the values to enrich |
| Store enrichment details to Index | Optional | Should data be saved in an index? |
| Index | Conditional | The index to save the enriched data |
| Interval | Yes | Enrichment frequency (1H, 4H, 6H, 12H, 24H) |
| Enrich Historical Data | Conditional | Enable to collect historical vulnerability data from a specific timestamp |
| Start Date | Conditional | Date and time from which you want to fetch events. Enter the value in 'YYYY-MM-DDThh:mm:ss' format e.g. 2025-04-17T09:12:36. Time zone will be set to UTC |
Upload and analyze Software Bill of Materials files for vulnerability assessment.
| Parameter | Required | Description |
|---|---|---|
| SBOM File | Yes | Upload SPDX or CycloneDX format file |
| SBOM File Identifier | Yes | Unique identifier for the SBOM file |
| Overwrite existing enriched data for this file | Optional | Replace existing data for same identifier |
| Store enrichment details to Index | Optional | Save enriched data to Splunk index |
| Index | Conditional | The index to save the enriched data |
Perform one-time enrichment of specific CVEs, PURLs, or CPEs.
| Parameter | Required | Description |
|---|---|---|
| Enrich Data For | Yes | Data type (CVEs, PURLs, CPEs) |
| Ad hoc Input Type | Yes | Upload CSV or Add manually |
| CSV File | Conditional | Upload the CSV File here |
| Column Name | Conditional | The Column Name having values to enrich |
| Other Column Name | Conditional | Other columns you want to add in the enriched data from the source |
| Values | Conditional | Comma-separated list of identifiers |
| Store enrichment details to lookup | Optional | Save results to lookup table |
| Store enrichment details to Index | Optional | Save results to Splunk index |
| Index | Conditional | The index to save the enriched data |
The VulnCheck Exploit Intelligence App For Splunk provides the following dashboards:
Users can access this dashboard by going to VulnCheck Exploit Intelligence App For Splunk > Executive Overview.
| Panel Name | Visualization | Description | Drilldown |
|---|---|---|---|
| Vulnerability Priority Pyramid | Custom Visualization | Visual pyramid showing CVE distribution across threat stages (Ransomware, Botnet, etc.). | No |
| Exploited CVEs | Single Value | Number of CVEs with new exploit activity in the selected time range. | No |
| Ransomware-Linked CVEs | Single Value | Number of CVEs newly associated with ransomware activity. | No |
| Botnets-Linked CVEs | Single Value | Number of CVEs newly associated with botnet activity. | No |
| Threat Actor-Linked CVEs | Single Value | Number of CVEs with new threat actor activity. | No |
| Proof of Concept-Linked CVEs | Single Value | Number of CVEs with new public proof-of-concept exploits. | No |
| Weaponized-Linked CVEs | Single Value | Number of CVEs with new weaponized exploit activity. | No |
| Top 5 Most Exploited CVEs | Table | Table of the top 5 CVEs with the highest exploit counts with extra information. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Exploited CVEs | Pie chart | Pie chart of the top 10 most exploited CVEs. | No |
| Severity Breakdown | Pie chart | Pie chart showing the distribution of CVEs by severity (Critical, High, etc.). | No |
| 20 Most Recent Exploit References | Table | Table of the 20 most recently added exploit references. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| 3 day trending CVEs | Table | Table of CVEs trending in the last 3 days and their reference count. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Vulnerability Categories by Exploits | Line Chart | Top 10 Vulnerability Categories by Exploits. | No |
| Top 10 Weakness (CWE) Distribution | Area Chart | Top 10 CWE (weakness) types by count. | No |
| Exploit Publication Trend of Last Year | Line Chart | Timechart showing the number of CVEs with new exploits over time. | No |
| Recent VulnCheck KEVs Not in CISA KEV | Table | CVEs in VulnCheck KEV but not in CISA KEV, with risk and exploit details. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| CVSS and VulnCheck KEV Discrepancies | Table | CVEs with low/medium CVSS but in VulnCheck KEV, highlighting risk discrepancies. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Threat Actors by CVE Volume | Bar Chart | Top 10 threat actors associated with the most CVEs. | No |
| Top 10 Ransomware by CVE Volume | Bar Chart | Top 10 ransomware families by CVE association. | No |
| Top 10 Botnets by CVE Volume | Bar Chart | Top 10 botnets by CVE association. | No |
| MITRE ATT&CK Details | Custom Visualization | MITRE ATT&CK heatmap showing technique coverage by CVE count. | No |
Users can access this dashboard by going to VulnCheck Exploit Intelligence App For Splunk > CVE Explorer.
| Panel Name | Visualization | Description | Drilldown |
|---|---|---|---|
| CVE Threat Pyramid | Custom Visualization | Single-CVE pyramid showing threat stage classification. | No |
| Description | Table | Table showing the description of the selected CVE. | No |
| Exploit Information | Table | Table of key attributes: KEV status, status, exploit count, threat associations, etc. | No |
| EPSS | Table | EPSS score, percentile, and last modified date for the CVE. | No |
| CVSS-B | Table | CVSS base metrics (version, vector, impact, etc.) for the CVE. | No |
| CVSS-BT | Table | Temporal metrics for the CVE. | No |
| SSVC | Table | Stakeholder-Specific Vulnerability Categorization (CISA/VulnCheck) for the CVE. | No |
| Exploits Maturity | Pie Chart | Distribution of exploit maturity levels for the CVE. | No |
| Top 10 Exploits Sources | Bar Chart | Top sources of exploit references for the CVE. | No |
| Exploits Availability | Bar Chart | Types of exploit availability for the CVE. | No |
| Exploitation Lifecycle Timeline | Custom Visualization | Interactive timeline of key exploitation events for the CVE. | No |
| CVE Age (Days) | Single Value | Days since the CVE was published. | No |
| CVE Weakness Details | Column Chart | Distribution of CWE (weakness) types for the CVE. | No |
| Categorization tags | Pie Chart | Distribution of categorization tags for the CVE. | No |
| Exploits | Table | Table of known exploits for the CVE, with type, maturity, and date. | No |
| References | Table | Table of reference URLs and tags for the CVE. | No |
Users can access this dashboard by going to VulnCheck Exploit Intelligence App For Splunk > SBOM Risk Analyzer.
| Panel Name | Visualization | Description | Drilldown |
|---|---|---|---|
| Top 10 Exploited SBOM Identifiers | Pie Chart | Top 10 SBOM file identifiers with the most exploited vulnerabilities. | No |
| Top 5 Most Exploited PURLs | Bar Chart | Top 5 package URLs (PURLs) in SBOM data by exploit count. | No |
| Top 5 Most Exploited CPEs | Bar Chart | Top 5 CPEs in SBOM data by exploit count. | No |
| Total SBOM CVEs | Single Value | Number of unique CVEs for the selected SBOM file identifier. | No |
| Vulnerable Components | Table | Table of vulnerable products (PURLs/CPEs) in the selected SBOM, with risk and exploit info. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Fixed Versions | Table | Table of affected and fixed versions for vulnerable PURLs in the SBOM. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
Users can access this dashboard by going to VulnCheck Exploit Intelligence App For Splunk > Ad hoc Enriched Data.
This dashboard displays the latest enriched data from ad hoc enrichment operations. It shows the most recent results after enrichment is completed, providing visibility into CVEs, PURLs, or CPEs that were processed through the ad hoc enrichment feature.
| Panel Name | Visualization | Description | Drilldown |
|---|---|---|---|
| Latest Ad hoc Enriched Data | Table | Displays the most recent enriched vulnerability data from ad hoc operations, including CVEs, exploit information, EPSS scores, and associated data. | No |
Users can access this dashboard by going to VulnCheck Exploit Intelligence App For Splunk > Reporting.
This dashboard provides a capture button. When the user presses it, a PDF file of the dashboard will be generated containing the information of the CVEs provided in the filter.
| Panel Name | Visualization | Description | Drilldown |
|---|---|---|---|
| Vulnerability Priority Pyramid | Custom Visualization | Visual pyramid showing CVE distribution across threat stages (Ransomware, Botnet, etc.). | No |
| Exploited CVEs | Single Value | Number of CVEs with new exploit activity in the selected time range. | No |
| Ransomware-Linked CVEs | Single Value | Number of CVEs newly associated with ransomware activity. | No |
| Botnets-Linked CVEs | Single Value | Number of CVEs newly associated with botnet activity. | No |
| Threat Actor-Linked CVEs | Single Value | Number of CVEs with new threat actor activity. | No |
| Proof of Concept-Linked CVEs | Single Value | Number of CVEs with new public proof-of-concept exploits. | No |
| Weaponized-Linked CVEs | Single Value | Number of CVEs with new weaponized exploit activity. | No |
| Top 5 Most Exploited CVEs | Table | Table of the top 5 CVEs with the highest exploit counts with extra information. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Exploited CVEs | Pie chart | Pie chart of the top 10 most exploited CVEs. | No |
| Severity Breakdown | Pie chart | Pie chart showing the distribution of CVEs by severity (Critical, High, etc.). | No |
| 20 Most Recent Exploit References | Table | Table of the 20 most recently added exploit references. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| 3 day trending CVEs | Table | Table of CVEs trending in the last 3 days and their reference count. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Vulnerability Categories by Exploits | Line Chart | Top 10 Vulnerability Categories by Exploits. | No |
| Top 10 Weakness (CWE) Distribution | Area Chart | Top 10 CWE (weakness) types by count. | No |
| Exploit Publication Trend of Last Year | Line Chart | Timechart showing the number of CVEs with new exploits over time. | No |
| Recent VulnCheck KEVs Not in CISA KEV | Table | CVEs in VulnCheck KEV but not in CISA KEV, with risk and exploit details. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| CVSS and VulnCheck KEV Discrepancies | Table | CVEs with low/medium CVSS but in VulnCheck KEV, highlighting risk discrepancies. | Yes (Clicking on any CVE redirects to CVE Explorer dashboard with the clicked CVE's details) |
| Top 10 Threat Actors by CVE Volume | Bar Chart | Top 10 threat actors associated with the most CVEs. | No |
| Top 10 Ransomware by CVE Volume | Bar Chart | Top 10 ransomware families by CVE association. | No |
| Top 10 Botnets by CVE Volume | Bar Chart | Top 10 botnets by CVE association. | No |
| MITRE ATT&CK Details | Custom Visualization | MITRE ATT&CK heatmap showing technique coverage by CVE count. | No |
The app provides eight custom commands for enrichment and data collection:
vulncheckexploitenrichmentalltimecommand
vulncheckexploitenrichmentindexcommand
vulncheckexploitenrichmentlookupcommand
vulncheckexploitenrichmentcimcommand
vulnchecktrendingcvescommand
vulncheckexploitadhocenrichmentcommand
vulncheckexploitintelligencesbomriskanalysiscommand
Note: Non-admin users require appropriate permissions to run custom commands.
Note: If a user wants to know how to create notable events, refer to this document
The app maintains several lookup tables for persistent data storage:
The app includes several automated saved searches:
Management: Settings > Searches, reports, and alerts (filter by VulnCheck app)
Go to Settings > Searches, reports, and alerts. Filter by VulnCheck app, and enable/disable as needed.
To troubleshoot VulnCheck Exploit Intelligence App For Splunk, check $SPLUNK_HOME/var/log/splunk/vulncheck_exploit_intelligence*.log or use the search query index="_internal" source=*vulncheck_exploit_intelligence*.log* to see all logs in the UI. For ERROR logs specifically, use index="_internal" source=*vulncheck_exploit_intelligence*.log* ERROR query in the Splunk UI.
Note that all log files of this App will be generated in $SPLUNK_HOME/var/log/splunk/ directory.
If users are facing problems related to CVE data not being visible in dashboards, check the vulncheck_enriched lookup.
App icons are not showing up: The app does not require a restart after installation for functionalities to work. However, icons will be visible after one Splunk restart post-installation.
If data collection is not working, ensure that the internet is active (on a proxy machine, if proxy is enabled) and also ensure that the KV store is enabled.
Check vulncheck_exploit_intelligence*.log* files for VulnCheck Exploit Intelligence App For Splunk data collection for any relevant error messages
vulncheckexploitenrichmentalltimecommand
Check vulncheck_exploit_intelligence_enrichment_all_time.log file for further analysis.
vulncheckexploitenrichmentindexcommand
Check vulncheck_exploit_intelligence_enrichment_index_command.log file for further analysis.
vulncheckexploitenrichmentlookupcommand
Check vulncheck_exploit_intelligence_enrichment_lookup_command.log file for further analysis.
vulncheckexploitenrichmentcimcommand
Check vulncheck_exploit_intelligence_enrichment_cim_command.log file for further analysis.
vulncheckexploitadhocenrichmentcommand
Check vulncheck_exploit_intelligence_ad_hoc_command.log file for further analysis.
vulnchecktrendingcvescommand
Check vulncheck_exploit_intelligence_trending_cves_command.log file for further analysis.
vulncheckexploitintelligencesbomriskanalysiscommand
Check vulncheck_exploit_intelligence_sbom_risk_analysis_command.log file for further analysis.
To see ingested data for VulnCheck Exploit Intelligence App For Splunk, select the Search tab. Search index={Index that user has selected to store enriched data} sourcetype=vulncheck:enrichment
Verify the vulncheck_enriched lookup contains data. Make sure that the data is present in the selected time range in the dashboard.
If IP enrichment is failing:
NOTE: If a user wants to know how to create notable events, refer to this document.
VulnCheck Exploit Intelligence App for Splunk installation file.$SPLUNK_HOME/etc/apps/vulncheck_exploit_intelligence_app_for_splunk$SPLUNK_HOME/var/log/splunk/vulncheck_exploit_intelligence*.log*