Hi Simon,
The CVEs shown in Wazuh come from the vulnerability feeds it consumes—mainly the NVD (National Vulnerability Database) and, when applicable, OVAL feeds provided by vendors/distributions. Wazuh then correlates those CVEs with the endpoint’s software inventory (installed packages and their versions) to determine exposure.
Regarding your specific questions:
- Does it consider small updates and patches?
Yes, as long as they are reflected in the inventory as a version/release change and the feed defines affected/fixed versions accordingly. Wazuh’s detection is version-based; if a “patch” is applied without changing the reported package version, vulnerability detection cannot reliably distinguish it.
In the case of Windows, when installing a hotfix, we consider the list of vulnerabilities it fixes, so we verify the hotfixes to check that the OS does not have any affected vulnerabilities.
Wazuh leverages CPE information (when available—especially from NVD) as part of the matching/correlation process between inventoried software and published vulnerabilities. The accuracy depends on how well the detected software can be mapped to the corresponding identifiers (e.g., CPE) and version ranges provided by the data sources.