US 12,067,127 B2
Software vulnerability detection in managed networks
Kurt Joseph Zettel, II, Nashville, TN (US); David Victor Barkovic, Mercer Island, WA (US); and Richard Kenneth Reybok, Santee, CA (US)
Assigned to ServiceNow, Inc., Santa Clara, CA (US)
Filed by ServiceNow, Inc., Santa Clara, CA (US)
Filed on Aug. 10, 2022, as Appl. No. 17/885,330.
Application 17/885,330 is a continuation of application No. 16/554,218, filed on Aug. 28, 2019, granted, now 11,423,155.
Prior Publication US 2022/0382881 A1, Dec. 1, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/033 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method comprising:
receiving results of a vulnerability analysis performed on a software application discovered in a managed network, wherein the results indicate:
a vulnerability to which the software application is subject; and
a severity factor that indicates criticality of the vulnerability;
accessing persistent storage that stores:
representations of configuration items discovered in the managed network, wherein the configuration items include computing devices deployed within the managed network and software applications installed on the computing devices; and
relationship data mapping the software applications to computing devices on which the software applications are installed;
determining, from the representations of configuration items in the persistent storage, a count of computing devices on which the software application is installed;
calculating a security threat score for the vulnerability, wherein the security threat score is at least based on the severity factor of the vulnerability and the count of computing devices; and
calculating a service-level security threat score for a networked service provided by the managed network via the software application, wherein the networked service is defined by a set of the configuration items and relationships therebetween as indicated by the relationship data, and wherein the service-level security threat score is based on severity factors associated with the set of the configuration items.