

--
You received this message because you are subscribed to the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/f89e0497-7fef-41d6-adfa-e1d200df2178n%40googlegroups.com.
Regarding the actual issue:
I went through the alert logs again yesterday. It’s definitely the case that some servers report the fixed version, but a large number do not. This affects both Red Hat and SLES servers. Even after several days, the CVE remains active.
All servers are running the latest agent version, and the agent also runs whenever packages are updated. The inventory in IT Hygiene is correct; only some packages are missing the installation date.
I really want to get this under control. Is there a way to trigger the scan again and have the vulnerability database rewritten without deleting the index?






Hello,
Thanks for the detailed investigation and the screenshots; they are very helpful.
Let me clarify how the “solved” status works and why you might be seeing the same CVE both as solved and not solved:
1. How “solved” is marked internally
Each vulnerability event is generated by matching the CVE/CTI entry (including vulnerability.scanner.condition)against the current software inventory of the agent.
Verify that CTI sync/tasks are completing successfully in the manager logs.