cve-impact
npx skills add https://github.com/dmartinol/ai5-marketplaces --skill cve-impact
Agent 安装分布
Skill 文档
CVE Impact Analysis Skill
This skill helps SREs analyze CVE vulnerabilities to understand their impact on systems before creating remediation playbooks.
Integration with Remediator Agent: The remediator agent orchestrates this skill as part of its Step 1 (Impact Analysis) workflow for complex remediation scenarios. For simple standalone impact analysis, you can invoke this skill directly.
When to Use This Skill
Use this skill directly when you need:
- Standalone CVE impact analysis without remediation planning
- Quick risk assessment for a single CVE
- Understanding which systems are affected by a CVE
- CVE severity assessments for change management documentation
- Risk assessment reports for management
Use the remediator agent when you need:
- CVE analysis followed by remediation playbook generation
- Complex workflows involving multiple CVEs and systems
- Integrated risk assessment + remediation planning + execution guidance
- Batch remediation across infrastructure
- End-to-end CVE management (analysis â validation â remediation â verification)
How they work together: The remediator agent orchestrates this skill as part of its comprehensive workflow, combining impact analysis with context gathering, playbook generation, and execution guidance. The agent uses the skill’s analysis capabilities and extends them with remediation planning.
Workflow
0. List Critical CVEs (Optional – For Discovery Queries)
MCP Tool: get_cves (from insights-mcp vulnerability toolset)
Use this step when users ask: “What are the critical vulnerabilities?”, “Show me high-severity CVEs”, “List all vulnerabilities on my account”
Retrieve all CVEs affecting the account, filtered by severity:
# Get all CVEs with Critical or Important severity
get_cves(
severity=["Critical", "Important"],
sort_by="cvss_score",
limit=20
)
# Expected output:
CVE-2024-1234 (CVSS 9.8, Critical) - kernel
Affected systems: 15
Remediation: Available
CVE-2024-5678 (CVSS 8.1, Important) - httpd
Affected systems: 8
Remediation: Available
CVE-2024-9012 (CVSS 7.5, Important) - openssl
Affected systems: 25
Remediation: Available
After listing CVEs:
- Sort by CVSS score (highest first) or by number of affected systems
- Provide summary table with CVE ID, severity, affected systems count, remediation availability
- Offer to analyze any specific CVE in detail (use Step 1 below)
- Offer to create remediation plan (transition to remediator agent)
1. CVE Information Retrieval (For Specific CVE Analysis)
MCP Tool: get_cve (from insights-mcp vulnerability toolset)
Retrieve comprehensive CVE metadata:
CVE ID: CVE-YYYY-NNNNN
CVSS Score: X.X (Base score from NIST)
Severity: Critical/High/Medium/Low
Attack Vector: Network/Adjacent/Local/Physical
Attack Complexity: Low/High
Privileges Required: None/Low/High
User Interaction: None/Required
Scope: Unchanged/Changed
Confidentiality Impact: None/Low/High
Integrity Impact: None/Low/High
Availability Impact: None/Low/High
Description: [CVE description from NVD/Red Hat]
Affected Packages: [List of packages and versions]
Published Date: YYYY-MM-DD
Last Modified: YYYY-MM-DD
2. Affected Systems Identification
MCP Tool: get_cve_systems (from insights-mcp vulnerability toolset)
Identify which systems in your infrastructure are affected by the CVE:
Affected Systems:
- system-uuid-1 (hostname: web-server-01, IP: 10.0.1.10)
- Package: httpd-2.4.37-1.el8
- Status: Vulnerable
- system-uuid-2 (hostname: web-server-02, IP: 10.0.1.11)
- Package: httpd-2.4.37-1.el8
- Status: Vulnerable
Total Affected Systems: N
3. System Classification
Classify affected systems by environment and criticality based on tags from Red Hat Insights:
System Classification:
- Production systems: N (highest priority)
- Staging systems: M (test before prod)
- Development systems: K (lowest priority)
- Bare metal: X systems
- Virtual machines: Y systems
4. Risk Assessment
Provide a risk assessment based on:
- CVSS score and severity
- Number of affected systems
- System criticality (production vs non-production)
- Attack vector and exploitability
- Known exploits in the wild
Output Format:
Risk Assessment Summary
âââââââââââââââââââââââ
Overall Risk Level: Critical/High/Medium/Low
Factors:
â CVSS Score: X.X (Severity: High)
â Affected Systems: N systems
â Environment: Production (Critical)
â Attack Vector: Network (Remote exploitable)
â Exploitability: Proof-of-concept exists
â User Interaction: None required
Recommendation: Immediate remediation recommended
Priority: P0 (within 24 hours) / P1 (within 7 days) / P2 (within 30 days)
5. Impact Analysis
Analyze the potential business impact:
Impact Analysis
âââââââââââââââââââââââ
Service Impact:
- Web services (web-server-01, web-server-02): High availability risk
- API endpoints: Potential data exposure
Business Impact:
- Confidentiality: Customer data could be exposed
- Integrity: System files could be modified
- Availability: Service disruption possible
Compliance Impact:
- PCI-DSS: Non-compliance if not remediated
- SOC 2: Control failure
6. Remediation Readiness Check
Check if remediation is available:
Remediation Availability
âââââââââââââââââââââââ
â Automated Playbook: Available
â Package Update: httpd-2.4.37-2.el8 (fixed version)
â Reboot Required: No
â Estimated Downtime: < 5 minutes per system
OR
â Automated Playbook: Not available
â Manual Steps Required: Yes
1. Update package manually: yum update httpd
2. Restart service: systemctl restart httpd
3. Verify fix: httpd -v
Output Template
When completing a CVE impact analysis, provide output in this format:
# CVE Impact Analysis Report
## CVE Information
**CVE ID**: CVE-YYYY-NNNNN
**CVSS Score**: X.X
**Severity**: Critical/High/Medium/Low
**Published**: YYYY-MM-DD
**Description**:
[Brief description of the vulnerability]
**Affected Packages**:
- package-name version-range
## Affected Systems
**Total Systems**: N
| System | Hostname | Environment | Package | Status |
|--------|----------|-------------|---------|--------|
| uuid-1 | server-01 | Production | httpd-2.4.37 | Vulnerable |
| uuid-2 | server-02 | Production | httpd-2.4.37 | Vulnerable |
## Risk Assessment
**Overall Risk**: Critical/High/Medium/Low
**Priority**: P0/P1/P2
**Recommendation**: [Immediate remediation / Schedule maintenance / Monitor]
**Key Factors**:
- Attack Vector: [Network/Local/etc]
- Exploitability: [Known exploits / PoC available / Theoretical]
- Impact: [High/Medium/Low]
## Business Impact
- **Confidentiality**: [Impact description]
- **Integrity**: [Impact description]
- **Availability**: [Impact description]
## Remediation Options
- â Automated playbook available
- â Manual steps documented
- â Requires testing in staging first
- â Maintenance window recommended
## Next Steps
1. [ ] Approve remediation plan
2. [ ] Schedule maintenance window (if needed)
3. [ ] Create remediation playbook (use remediator agent)
4. [ ] Test in staging environment
5. [ ] Execute in production
6. [ ] Verify remediation success
Examples
Example 0: List Critical Vulnerabilities (Discovery Query)
User Request: “What are the most critical vulnerabilities on my account?”
Skill Response:
- Call
get_cves(severity=["Critical", "Important"], sort_by="cvss_score", limit=20) - Parse and sort results by CVSS score
- Return summary table:
# Critical Vulnerabilities Summary
Found 12 Critical/Important CVEs affecting your systems:
| CVE ID | CVSS | Severity | Affected Systems | Remediation | Priority |
|--------|------|----------|------------------|-------------|----------|
| CVE-2024-1234 | 9.8 | Critical | 15 systems | Available | P0 - Immediate |
| CVE-2024-5678 | 8.1 | Important | 8 systems | Available | P1 - 7 days |
| CVE-2024-9012 | 7.5 | Important | 25 systems | Available | P1 - 7 days |
| ... | ... | ... | ... | ... | ... |
**Recommendations**:
- CVE-2024-1234: Immediate remediation required (CVSS 9.8, network exploitable)
- CVE-2024-5678: Schedule remediation within 7 days
- CVE-2024-9012: High system count (25 systems) - consider batch remediation
**Next Steps**:
- Analyze any specific CVE for details: "Analyze CVE-2024-1234"
- Create remediation plan: "Remediate CVE-2024-1234 on all affected systems"
- Wait for user to request specific CVE analysis or remediation
- If user says “remediate CVE-X”, respond: “I’ll transition to the remediator agent to create the remediation playbook”
Example 1: High-Severity CVE Analysis
User Request: “Analyze the impact of CVE-2024-1234”
Skill Response:
- Retrieve CVE details using
get_cve - List affected systems using
get_cve_systems - Classify systems by environment and criticality
- Provide risk assessment and recommendations
- Suggest next steps (use remediator agent if remediation needed)
Example 2: Multiple CVE Comparison
User Request: “Compare the impact of CVE-2024-1234 and CVE-2024-5678”
Skill Response:
- Retrieve details for both CVEs
- Create comparison table (CVSS, severity, affected systems)
- Recommend prioritization order
- Suggest batch remediation if both should be fixed together
Example 3: Environment-Specific Analysis
User Request: “Which production systems are affected by CVE-2024-1234?”
Skill Response:
- Retrieve CVE details
- Filter affected systems by environment tag
- Provide production-specific impact assessment
- Include business impact analysis for production services
Integration with Remediator Agent
After completing impact analysis, the skill should:
-
Suggest transition to remediation if risk is high:
Based on this analysis, immediate remediation is recommended. Would you like me to create a remediation playbook? (This will use the remediator agent) -
Provide context for remediation:
- CVE ID
- Affected system UUIDs
- Recommended execution method (AAP/Tower/Manual)
- Suggested maintenance window
Error Handling
CVE not found:
CVE-YYYY-NNNNN was not found in the Red Hat CVE database.
Possible reasons:
- CVE ID is incorrect
- CVE is too recent and not yet in database
- CVE doesn't affect RHEL systems
Suggestions:
- Verify CVE ID format (CVE-YYYY-NNNNN)
- Check NVD database: https://nvd.nist.gov/vuln/search
- Try alternative CVE IDs if this is an alias
No affected systems:
CVE-YYYY-NNNNN Analysis Complete
Good news! No systems in your infrastructure are affected by this CVE.
Possible reasons:
- Your systems are already patched
- Affected packages are not installed
- Systems are running different versions
No action required.
Best Practices
- Always start with risk assessment before deciding on remediation
- Check for known exploits using CVE description and references
- Consider business impact not just CVSS scores
- Group related CVEs for batch remediation when possible
- Document findings for compliance and audit purposes
- Test in staging first for high-impact changes
Tools Reference
This skill primarily uses:
get_cve(vulnerability toolset) – Get details about a specific CVEget_cve_systems(vulnerability toolset) – Get list of systems affected by a CVEget_cves(vulnerability toolset) – Get list of all CVEs affecting the account (optional)get_system_cves(vulnerability toolset) – Get list of CVEs affecting a specific system (optional)get_host_details(inventory toolset) – Get detailed system information (optional)
All tools are provided by the insights-mcp MCP server configured in .mcp.json.