The main script GET-CRIT-VULN.py will JSON fromat all the critical vulnerabilities and the effected products of each Asset ID for a list of Customer IDs
{
"<CID STRING - Parent>": [
"<CID NAME - Parent>"
],
"<CID STRING - Child 0>": [
"<CID NAME - Child 0>",
{
"<AID 0>": [
{
"Hostname": "",
"OS Product Name": "",
"OS Build": "",
"Last Login User": "",
"Manufacturer": "",
"Model": "",
"Critical CVE": {
"CVE-0000-0000": [
"<Affected Product>"
]
}
}
]
},
]
}
python3 -m pip install crowdstrike-falconpy pandas
Place the client ID and secret in the config-empty.py file
The report contains Spotlight Subscriber information under the Falcon Module Subscriptions column
python CRIT-VULN.py parent_child_report_<date>.csv
Retrieves all devices that have been active over the last 30 days by customer