Issue retrieving CVE details using responseType: reduced in Defender EASM Assets API

Dev Parmar 0 Reputation points
2025-04-28T08:07:52.6366667+00:00

I'm working with the Microsoft Defender External Attack Surface Management (EASM) API, specifically the assets endpoint.

When I make a request using responseType: reduced and apply a filter for a specific CVE ID, the response does not include any information related to that particular CVE ID sometimes — even though the asset is confirmed to be affected.

reduced However, using the same CVE filter with responseType: standard returns the expected data, including the relevant CVE details.

standard

Can someone help clarify why the reduced response does not return the CVE information that was passed in filter? Are there known limitations or documentation around filtering by CVE in this mode?

Appreciate any insights — thanks in advance!

Microsoft Defender for Cloud
Microsoft Defender for Cloud
An Azure service that provides threat protection for workloads running in Azure, on-premises, and in other clouds. Previously known as Azure Security Center and Azure Defender.
1,528 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Navya 17,900 Reputation points Microsoft External Staff
    2025-04-29T21:48:46.83+00:00

    Hi @Dev Parmar

    The behavior you're observing with the Microsoft Defender External Attack Surface Management (EASM) API's assets endpoint is due to the design of the responseType parameter.

    The EASM API's assets endpoint supports multiple responseType values, each determining the amount of data included in the response:

    User's image For your reference: assetresponsetype

    When you use responseType=reduced, the API returns a limited subset of asset properties. This subset may not include detailed vulnerability information, such as associated CVE IDs. As a result, even if an asset is affected by a specific CVE, that information might not be present in the reduced response.

    On the other hand, responseType=standard includes more comprehensive asset details, which typically encompass vulnerability data, including CVE associations. Therefore, filtering by a specific CVE ID and using responseType=standard is more likely to return the expected data.

    To ensure that your filtered queries by CVE ID return complete and accurate information Use responseType=standard or responseType=full. These response types include detailed vulnerability information, making them suitable for CVE-based filtering.

    Hope this helps. Do let us know if you any further queries.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.