Supported Software

Last updated: December 23, 2025

This article defines what Cyrisma can remediate directly through patching or configuration enforcement. It serves as an authoritative reference for supported third-party software patching and built-in security configuration remediations.

This content applies to remediation actions performed through Patch Manager and does not describe mitigation plans, which are covered separately as a governance and tracking mechanism.


Scope of Direct Remediation in Cyrisma

Cyrisma supports two primary categories of direct remediation:

  • Software-based remediation through patching of supported third-party applications and Windows updates

  • Configuration-based remediation for specific operating system security settings

If an item falls outside these categories, Cyrisma may still detect the issue, but remediation must be handled manually or tracked through mitigation plans.


Supported Third-Party Software for Patching

Cyrisma can directly patch a defined set of third-party applications on Windows systems. Detection of an application does not guarantee patch support; only applications listed below are eligible for automated or manual patching.

Supported Application Categories

Supported applications commonly fall into these categories:

  • Web browsers and browser components

  • Remote access and VPN software

  • Developer tooling and runtimes

  • Document viewers and media players

  • Backup and virtualization utilities

  • Common productivity and collaboration tools

Authoritative List of Patchable Third-Party Applications

The following third-party software is currently supported for patching in Cyrisma:

7-Zip
Adobe Acrobat Reader DC (Continuous)
Adobe AIR Runtime
Adobe Flash Player (IE and NPAPI variants)
Apache Tomcat
Apple iCloud
Apple iTunes
Bitwarden Desktop
Cisco Webex App
Cisco Webex Meetings
Docker Desktop for Windows
Docker CE for Windows
FileZilla
Firebird
Ghostscript
Git
Google Chrome (Consumer and Enterprise)
Greenshot
ImageMagick
IrfanView
Java Runtime Environment (32-bit and 64-bit)
LibreOffice
Microsoft Edge
Mozilla Firefox (x86, x64, ESR variants)
Mozilla Thunderbird (32-bit and 64-bit)
MySQL Connector for Python
Node.js
Node.js (NVM)
Notepad++
OpenSSL
OpenVPN (x86 and x64)
Oracle VM VirtualBox
PHP (XAMPP)
PuTTY (32-bit and 64-bit)
Python
RealVNC / VNC Server / VNC Viewer
Ruby
SafeNet Authentication Client
SonicWall NetExtender
TeamViewer (all supported variants)
TightVNC
UltraVNC
Veeam Agent
Visual Studio Code
Visual Studio Code Extensions (Python, ESLint, Java, Jupyter)
VLC Media Player
VMware Horizon Client
VMware Tools
WinRAR
WinSCP
Wireshark
Zoom Client (single-user, all-users, IT admin)

This list represents remediation capability, not detection coverage. Cyrisma may detect additional applications that are not patchable through the platform.


Windows Patch Remediation

Cyrisma supports remediation of Windows vulnerabilities through Windows Update–based patching. Patch Manager surfaces Windows KBs that are applicable to scanned endpoints and allows scheduling and tracking of those updates.

Windows patch remediation behavior follows Microsoft’s cumulative update model. Individual CVEs may map to older KBs that are superseded by newer cumulative updates.


Supported Security Configuration Remediations

In addition to software patching, Cyrisma supports remediation of select security configuration issues through direct system changes. These remediations address misconfigurations commonly flagged during vulnerability and secure baseline scans.

Obsolete SSL Versions

Remediation disables deprecated SSL protocols, including SSL 2.0 and SSL 3.0, which are vulnerable to known cryptographic attacks such as POODLE.

This remediation enforces secure protocol usage by modifying Windows SCHANNEL configuration.


Obsolete TLS Versions

Remediation disables TLS 1.0 and TLS 1.1, which are no longer considered secure and may expose systems to attacks such as Sweet32.

TLS configuration changes are applied at the operating system level and impact all applications relying on SCHANNEL.


Weak Cipher Suites

Remediation disables weak and deprecated cipher suites, including DES, RC4, and NULL encryption options.

This remediation reduces cryptographic attack surface by enforcing modern cipher standards.


WinTrust Certificate Padding Validation

Remediation enables the WinTrust EnableCertPaddingCheck setting to address vulnerabilities in Authenticode signature validation.

This configuration protects systems from crafted executable files that bypass signature validation.


Detection vs Remediation Capability

It is important to distinguish between what Cyrisma can detect and what it can remediate.

  • Detection identifies vulnerabilities, misconfigurations, or missing patches.

  • Remediation applies a technical fix through patching or configuration enforcement.

Not all detected issues are remediable through Cyrisma. Unsupported software, OS-level limitations, and platform-specific constraints may require manual remediation or tracking through mitigation plans.


Limitations and Considerations

  • Third-party patching applies to Windows systems only.

  • Linux and macOS vulnerabilities may be detected but are not currently patchable through Patch Manager.

  • Configuration remediations affect system-wide behavior and should be evaluated in the context of operational requirements.

  • Cyrisma does not provide automated rollback for applied patches or configuration changes.