Product - Maze

AI Agents that Investigate
and Resolve Cloud Vulnerabilities

By replicating the workflows of expert security engineers, Maze removes false positives, identifies the vulnerabilities that matter, and routes one‑click remediation actions to the right people.

Maze AI Vulnerability Analyst Flow Diagram
01
02
03
04

Investigate every vulnerability in context

Trained to replicate the workflows of expert security engineers, AI Agents deeply investigate vulnerabilities in the context of your cloud environment, compensating controls, and business.

CVE-2021-36222

Investigating...
Exception

Exploitation Requirement:

CentOS Linux 7

Present

Exploitation Requirement:

MIT Kerberos 5 1.18.3

Present

Exploitation Requirement:

KDC Server Running

Not Present

CVE-2024-53194

Investigating...
Exception

CVE-2024-6345

Investigating...
Exception

CVE-2024-45337

Investigating...
Investigating...
Investigating...

Exploitation Requirement:

Kernel version 5.10.230

Present

Exploitation Requirement:

The PCI subsystem is actively used

Present

Exploitation Requirement:

PCI hot-plug subsystem

Present

Weaponized exploit is available

Security group allows SSH access

WAF not blocking SSH traffic on port 22

System has high confidentiality rating

Server with customer-facing applications

IAM role with extensive permissions

01.

Incident created

02.

WAF policy blocking SSH traffic
on port 22 deployed

03.

Ticket created

04.

Slack notification sent to
#maze-alerts

CVE-2021-36222

Investigating...
Exception

Exploitation Requirement:

CentOS Linux 7

Present

Exploitation Requirement:

MIT Kerberos 5 1.18.3

Present

Exploitation Requirement:

KDC Server Running

Not Present

CVE-2024-53194

Investigating...
Exception

CVE-2024-6345

Investigating...
Exception

CVE-2024-45337

Investigating...
Investigating...
Investigating...

Ignore non-exploitable vulnerabilities with confidence

Over 90% of vulnerabilities cannot be exploited in the context of your environment. AI investigations allow you to confidently ignore non-exploitable vulnerabilities and automatically generate reports for auditors.

CVE-2021-36222

Not Exploitable
Exception

Exploitation Requirement:

CentOS Linux 7

Present

Exploitation Requirement:

MIT Kerberos 5 1.18.3

Present

Exploitation Requirement:

KDC Server Running

Not Present

CVE-2024-53194

Investigating...
Exception

CVE-2024-6345

Investigating...
Exception

CVE-2024-45337

Investigating...
Investigating...
Investigating...

Identify the vulnerabilities that matter to your business

In-depth analysis of technical and business context quickly identifies the vulnerabilities most likely to lead to a serious breach.

CVE-2021-36222

Not Exploitable
Exception

CVE-2024-53194

Not Exploitable
Exception

CVE-2024-6345

Not Exploitable
Exception

CVE-2024-45337

Investigating...
Investigating...
Investigating...

Exploitation Requirement:

Kernel version 5.10.230

Present

Exploitation Requirement:

The PCI subsystem is actively used

Present

Exploitation Requirement:

PCI hot-plug subsystem

Present

Weaponized exploit is available

Security group allows SSH access

WAF not blocking SSH traffic on port 22

System has high confidentiality rating

Server with customer-facing applications

IAM role with extensive permissions

Respond fast, and stop project managing remediation

Intelligent workflows generate high impact mitigation and remediation plans and route one-click actions to the right people.

CVE-2024-45337

Exploitable
High Likelihood
Critical Impact

System has high confidentiality rating

Server with customer-facing applications

IAM role with extensive permissions

01.

Incident created

02.

WAF policy blocking SSH traffic
on port 22 deployed

03.

Ticket created

04.

Slack notification sent to
#maze-alerts

FAQ