Getting Started
OIDC, RBAC, and Billing
- Authentication & User Info
- User Management
- Ancillary Services
- Teams
- API Credentials
- Roles & Permissions
- Billing - Account
- Billing - Payment Methods
- Billing - Tax IDs
- Billing - Invoices
- Billing - Subscriptions
- Internal M2M
ARP and Devices
- Devices
Developers API
- Sites
- Health
- Synchronous API
- Asynchronous API
- Port Forwards
Asynchronous (MikroTik)
- Bootstrap & Adoption
- Heartbeat
- Jobs
- Runbooks
- Sites
- Internal
- SFTP Auth
Backups
- Site Backups
BGP Feeds And Content Filter
- DNS Policy
- Tunnels & Sites
- Categories & Applications
- BGP Policy
- IP Lists
- Internal Hooks
Captive Portal
- IDP Integrations
- Instances
- Walled Garden
Control Plane Filter
- Policies
- Sites
- Checkin
- Router Commands
- Internal
- Transient Access
- Transient Forward
- Credentials
- Scheduler
CVE Scans
- Scan Schedules
- Scan Results
- CVE Management
- On-Demand Scans
Elastic IP Addressing
- Subnets
- IP Addresses (L2TP)
Logging
- Log Events
Metrics
- Syslog
- ARP
- Interfaces
- MikrotikStats
- Content
- Tunnels
Monitoring & Health
- Faults
Notifications
- Topics
- Groups
Scheduled Scripts
- Community Scripts
- Scheduled Scripts
- AI Generation
Schedules
- Schedules
- Internal
SLA Reports
- SLA Schedules
- SLA Reports
VPN
- Servers
- Sites
- Instances
- Peers
- VPN Client Tokens
- Internal
WAN Failover
- Failover
- Tunnel
- Services
- Gateway
Webhooks
- Integrations
CVE Management
Get CVEs by MAC Address
Retrieves all CVEs associated with a specific MAC address across all scans for the customer. Throttled (600 req/min). Requires cve:view
scope.
GET
/
mac-address
/
cves
Copy
Ask AI
curl --request GET \
--url https://api.altostrat.io/scans/cve/mac-address/cves \
--header 'Authorization: Bearer <token>'
Copy
Ask AI
{
"mac_address": "<string>",
"total_scans": 123,
"total_cve_instances": 123,
"stats": {
"unique_cve_count": 123,
"highest_score": 123,
"average_score": 123
},
"cves": [
{
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"cve_id": "CVE-2021-44228",
"description": "<string>",
"published_at": "2023-11-07T05:31:56Z",
"created_at": "2023-11-07T05:31:56Z",
"vector": "<string>",
"score": 123,
"severity": "NONE",
"assigner": "<string>",
"references": [
[
{
"url": "http://example.com/ref",
"name": "Example Ref"
}
]
],
"cve_detail": {
"cvss_version": "<string>",
"vector": "<string>",
"base_score": 123,
"severity": "<string>",
"impact_score": 123,
"exploitability_score": 123,
"metrics": {
"attack_vector": "<string>",
"attack_complexity": "<string>",
"privileges_required": "<string>",
"user_interaction": "<string>",
"scope": "<string>",
"confidentiality": "<string>",
"integrity": "<string>",
"availability": "<string>"
}
},
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"compliance_tags": [
"PCI-DSS"
],
"host": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"hostname": "<string>",
"mac_address": "<string>",
"manufacturer": "<string>",
"ip_address": "127.0.0.1"
},
"status": "open",
"other_occurrences": [
{
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"host_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"created_at": "2023-11-07T05:31:56Z"
}
]
}
]
}
Authorizations
Authentication token obtained via Altostrat platform login.
Query Parameters
The MAC address to search for (e.g., 00:1A:2B:3C:4D:5E).
Optional minimum CVSS score to filter results (0.0-10.0).
Required range:
0 <= x <= 10
Response
200
application/json
Detailed CVE information for the MAC address.
Detailed CVE information for a specific MAC address, grouped by CVE ID.
Copy
Ask AI
curl --request GET \
--url https://api.altostrat.io/scans/cve/mac-address/cves \
--header 'Authorization: Bearer <token>'
Copy
Ask AI
{
"mac_address": "<string>",
"total_scans": 123,
"total_cve_instances": 123,
"stats": {
"unique_cve_count": 123,
"highest_score": 123,
"average_score": 123
},
"cves": [
{
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"cve_id": "CVE-2021-44228",
"description": "<string>",
"published_at": "2023-11-07T05:31:56Z",
"created_at": "2023-11-07T05:31:56Z",
"vector": "<string>",
"score": 123,
"severity": "NONE",
"assigner": "<string>",
"references": [
[
{
"url": "http://example.com/ref",
"name": "Example Ref"
}
]
],
"cve_detail": {
"cvss_version": "<string>",
"vector": "<string>",
"base_score": 123,
"severity": "<string>",
"impact_score": 123,
"exploitability_score": 123,
"metrics": {
"attack_vector": "<string>",
"attack_complexity": "<string>",
"privileges_required": "<string>",
"user_interaction": "<string>",
"scope": "<string>",
"confidentiality": "<string>",
"integrity": "<string>",
"availability": "<string>"
}
},
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"compliance_tags": [
"PCI-DSS"
],
"host": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"hostname": "<string>",
"mac_address": "<string>",
"manufacturer": "<string>",
"ip_address": "127.0.0.1"
},
"status": "open",
"other_occurrences": [
{
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"scan_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"host_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"created_at": "2023-11-07T05:31:56Z"
}
]
}
]
}
Assistant
Responses are generated using AI and may contain mistakes.