Vulnerabilities are weaknesses detected on assets that can be exploited by a potential attacker to perform malevolent actions on the network.
Vulnerabilities are detected in Cisco Cyber Vision thanks to rules stored in the Knowledge DB. These rules are sourced from several CERTs (Computer Emergency Response Teams), manufacturers and partner manufacturers (such as Schneider or Siemens). Technically, vulnerabilities are generated from the correlation of the Knowledge DB rules and normalized asset and component properties. A vulnerability is detected when an asset or a component matches a Knowledge DB rule.
A vulnerability can be acknowledged to hide it from the active vulnerability list.