Altostrat Studio is here — the AI-native network operations IDE for engineers running production. Terminal, diagrams, runbooks, and Copilot in one workspace. Get started →
curl --request POST \
--url https://v1.api.altostrat.io/scans/cve/mac-address/cve/status \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"mac_address": "00:1A:2B:3C:4D:5E",
"cve_id": "CVE-2023-1234",
"status": "accepted",
"justification": "This vulnerability is related to a service that is not exposed to the internet and is firewalled internally. Risk is considered low."
}
'{
"data": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"mac_address": "00:1A:2B:3C:4D:5E",
"cve_id": "CVE-2023-1234",
"status": "accepted",
"justification": "Risk accepted due to internal-only service with no external access.",
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"expiration_date": "2023-11-07T05:31:56Z",
"created_by": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"updated_by": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z"
},
"message": "CVE status updated successfully"
}Updates the status of a specific CVE for a given MAC address. Use this to mark a vulnerability as ‘accepted’ (e.g., a false positive or acceptable risk) or ‘mitigated’ (e.g., a patch has been applied or a workaround is in place). Each update creates a new historical record.
curl --request POST \
--url https://v1.api.altostrat.io/scans/cve/mac-address/cve/status \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"mac_address": "00:1A:2B:3C:4D:5E",
"cve_id": "CVE-2023-1234",
"status": "accepted",
"justification": "This vulnerability is related to a service that is not exposed to the internet and is firewalled internally. Risk is considered low."
}
'{
"data": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"mac_address": "00:1A:2B:3C:4D:5E",
"cve_id": "CVE-2023-1234",
"status": "accepted",
"justification": "Risk accepted due to internal-only service with no external access.",
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"expiration_date": "2023-11-07T05:31:56Z",
"created_by": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"updated_by": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z"
},
"message": "CVE status updated successfully"
}Documentation Index
Fetch the complete documentation index at: https://altostrat.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
Enter your bearer token in the format: Bearer {token}
The details of the CVE status update.
The MAC address of the affected device.
"00:1A:2B:3C:4D:5E"
The CVE identifier to update.
"CVE-2023-1234"
The new status for the vulnerability.
accepted, mitigated "accepted"
A detailed reason for the status change, for audit purposes.
"This vulnerability is related to a service that is not exposed to the internet and is firewalled internally. Risk is considered low."
Was this page helpful?