Hello Michael,
To detect vulnerabilities, Wazuh agents collect a list of installed applications from monitored endpoints and send it periodically to the Wazuh server. Local SQLite databases in the Wazuh server store this list. Within the Wazuh server, the Vulnerability Detection module correlates the software inventory data with vulnerability content documents to detect vulnerable software on the monitored endpoint. These documents are Common Vulnerabilities and Exposures (CVE) records that are available in our Cyber Threat Intelligence (CTI) platform. Reference:
https://documentation.wazuh.com/current/user-manual/capabilities/vulnerability-detection/how-it-works.html
In Wazuh 4.8, the Vulnerability Detector module has been redesigned to allow users to perform global queries of vulnerabilities across various endpoints. Users can now view vulnerabilities across all monitored endpoints within an IT infrastructure. The Vulnerability Detector module pulls this data from the Wazuh repository, ensuring users can access the latest vulnerability information. Reference:
https://wazuh.com/blog/introducing-wazuh-4-8-0/
In the Inventory section, you can see all the active vulnerabilities from all endpoints in a listed table. Now, clicking on the details button, you can check more details of a vulnerability and vulnerability.package.condition there will help you to get the exact package condition. You can solve the vulnerability by upgrading the packages to the latest version as described there.
I hope it helps. Please let us know if you have any further issue here.
On Tuesday, July 30, 2024 at 2:43:11 PM UTC+6 Abdullah Al Rafi Fahim wrote:
Hello Michael,
To detect vulnerabilities, Wazuh agents collect a list of installed applications from monitored endpoints and send it periodically to the Wazuh server. Local SQLite databases in the Wazuh server store this list. Within the Wazuh server, the Vulnerability Detection module correlates the software inventory data with vulnerability content documents to detect vulnerable software on the monitored endpoint. These documents are Common Vulnerabilities and Exposures (CVE) records that are available in our Cyber Threat Intelligence (CTI) platform. Reference:
In Wazuh 4.8, the Vulnerability Detector module has been redesigned to allow users to perform global queries of vulnerabilities across various endpoints. Users can now view vulnerabilities across all monitored endpoints within an IT infrastructure. The Vulnerability Detector module pulls this data from the Wazuh repository, ensuring users can access the latest vulnerability information. Reference:
https://wazuh.com/blog/introducing-wazuh-4-8-0/
In the Inventory section, you can see all the active vulnerabilities from all endpoints in a listed table. Now, clicking on the details button, you can check more details of a vulnerability and vulnerability.package.condition there will help you to get the exact package condition. You can solve the vulnerability by upgrading the packages to the latest version as described there.
I hope it helps. Please let us know if you have any further issue here.