:doc:`Inspector2 <../../inspector2>` / Client / batch_get_finding_details

*************************
batch_get_finding_details
*************************



.. py:method:: Inspector2.Client.batch_get_finding_details(**kwargs)

  

  Gets vulnerability details for findings.

  

  See also: `AWS API Documentation <https://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetFindingDetails>`_  


  **Request Syntax**
  ::

    response = client.batch_get_finding_details(
        findingArns=[
            'string',
        ]
    )
    
  :type findingArns: list
  :param findingArns: **[REQUIRED]** 

    A list of finding ARNs.

    

  
    - *(string) --* 

    

  
  :rtype: dict
  :returns: 
    
    **Response Syntax**

    
    ::

      {
          'findingDetails': [
              {
                  'findingArn': 'string',
                  'cisaData': {
                      'dateAdded': datetime(2015, 1, 1),
                      'dateDue': datetime(2015, 1, 1),
                      'action': 'string'
                  },
                  'riskScore': 123,
                  'evidences': [
                      {
                          'evidenceRule': 'string',
                          'evidenceDetail': 'string',
                          'severity': 'string'
                      },
                  ],
                  'ttps': [
                      'string',
                  ],
                  'tools': [
                      'string',
                  ],
                  'exploitObserved': {
                      'lastSeen': datetime(2015, 1, 1),
                      'firstSeen': datetime(2015, 1, 1)
                  },
                  'referenceUrls': [
                      'string',
                  ],
                  'cwes': [
                      'string',
                  ],
                  'epssScore': 123.0
              },
          ],
          'errors': [
              {
                  'findingArn': 'string',
                  'errorCode': 'INTERNAL_ERROR'|'ACCESS_DENIED'|'FINDING_DETAILS_NOT_FOUND'|'INVALID_INPUT',
                  'errorMessage': 'string'
              },
          ]
      }
      
    **Response Structure**

    

    - *(dict) --* 
      

      - **findingDetails** *(list) --* 

        A finding's vulnerability details.

        
        

        - *(dict) --* 

          Details of the vulnerability identified in a finding.

          
          

          - **findingArn** *(string) --* 

            The finding ARN that the vulnerability details are associated with.

            
          

          - **cisaData** *(dict) --* 

            The Cybersecurity and Infrastructure Security Agency (CISA) details for a specific vulnerability.

            
            

            - **dateAdded** *(datetime) --* 

              The date and time CISA added this vulnerability to their catalogue.

              
            

            - **dateDue** *(datetime) --* 

              The date and time CISA expects a fix to have been provided vulnerability.

              
            

            - **action** *(string) --* 

              The remediation action recommended by CISA for this vulnerability.

              
        
          

          - **riskScore** *(integer) --* 

            The risk score of the vulnerability.

            
          

          - **evidences** *(list) --* 

            Information on the evidence of the vulnerability.

            
            

            - *(dict) --* 

              Details of the evidence for a vulnerability identified in a finding.

              
              

              - **evidenceRule** *(string) --* 

                The evidence rule.

                
              

              - **evidenceDetail** *(string) --* 

                The evidence details.

                
              

              - **severity** *(string) --* 

                The evidence severity.

                
          
        
          

          - **ttps** *(list) --* 

            The MITRE adversary tactics, techniques, or procedures (TTPs) associated with the vulnerability.

            
            

            - *(string) --* 
        
          

          - **tools** *(list) --* 

            The known malware tools or kits that can exploit the vulnerability.

            
            

            - *(string) --* 
        
          

          - **exploitObserved** *(dict) --* 

            Contains information on when this exploit was observed.

            
            

            - **lastSeen** *(datetime) --* 

              The date an time when the exploit was last seen.

              
            

            - **firstSeen** *(datetime) --* 

              The date an time when the exploit was first seen.

              
        
          

          - **referenceUrls** *(list) --* 

            The reference URLs for the vulnerability data.

            
            

            - *(string) --* 
        
          

          - **cwes** *(list) --* 

            The Common Weakness Enumerations (CWEs) associated with the vulnerability.

            
            

            - *(string) --* 
        
          

          - **epssScore** *(float) --* 

            The Exploit Prediction Scoring System (EPSS) score of the vulnerability.

            
      
    
      

      - **errors** *(list) --* 

        Error information for findings that details could not be returned for.

        
        

        - *(dict) --* 

          Details about an error encountered when trying to return vulnerability data for a finding.

          
          

          - **findingArn** *(string) --* 

            The finding ARN that returned an error.

            
          

          - **errorCode** *(string) --* 

            The error code.

            
          

          - **errorMessage** *(string) --* 

            The error message.

            
      
    
  
  **Exceptions**
  
  *   :py:class:`Inspector2.Client.exceptions.ValidationException`

  
  *   :py:class:`Inspector2.Client.exceptions.AccessDeniedException`

  
  *   :py:class:`Inspector2.Client.exceptions.ThrottlingException`

  
  *   :py:class:`Inspector2.Client.exceptions.InternalServerException`

  