I have wazuh 4.0.4 with following configuration on manager for vulnerability detection.
This manager does not have any access to the internet.
<vulnerability-detector>
<enabled>yes</enabled>
<interval>5m</interval>
<ignore_time>6h</ignore_time>
<run_on_start>yes</run_on_start>
<!-- Ubuntu OS vulnerabilities -->
<provider name="canonical">
<enabled>yes</enabled>
<os path="/local_path/com.ubuntu.focal.cve.oval.xml.bz2">focal</os>
<os path="/local_path/com.ubuntu.bionic.cve.oval.xml.bz2">bionic</os>
<os path="/local_path/com.ubuntu.xenial.cve.oval.xml.bz2">xenial</os>
<os path="/local_path/com.ubuntu.trusty.cve.oval.xml.bz2">trusty</os>
<update_interval>1h</update_interval>
</provider>
<!-- Debian OS vulnerabilities -->
<provider name="debian">
<enabled>yes</enabled>
<os path="/local_path/oval-definitions-buster.xml">buster</os>
<os path="/local_path/oval-definitions-stretch.xml">stretch</os>
<update_interval>1h</update_interval>
</provider>
<!-- RedHat OS vulnerabilities -->
<provider name="redhat">
<enabled>yes</enabled>
<os path="/local_path/com.redhat.rhsa-RHEL5.xml.bz2">5</os>
<os path="/local_path/rhel-6-including-unpatched.oval.xml.bz2">6</os>
<os path="/local_path/rhel-7-including-unpatched.oval.xml.bz2">7</os>
<os path="/local_path/rhel-8-including-unpatched.oval.xml.bz2">8</os>
<update_interval>1h</update_interval>
</provider>
<!-- Windows OS vulnerabilities -->
<provider name="msu">
<enabled>yes</enabled>
<path>/local_path/msu-updates.json.gz</path>
<update_interval>1h</update_interval>
</provider>
<!-- Aggregate vulnerabilities -->
# <provider name="nvd">
# <enabled>yes</enabled>
# <path>/local_path/nvd-feed.*json$</path>
# <update_interval>1h</update_interval>
# </provider>
</vulnerability-detector>
Wazuh log show following:
023/05/29 10:26:37 wazuh-modulesd: WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline.
2023/05/29 10:26:40 ossec-integratord: INFO: Remote integrations not configured. Clean exit.
2023/05/29 10:26:48 wazuh-modulesd: WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline.
2023/05/29 10:27:14 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Ubuntu Trusty' feed finished successfully.
2023/05/29 10:27:14 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Ubuntu Xenial' database update.
2023/05/29 10:27:30 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Ubuntu Xenial' feed finished successfully.
2023/05/29 10:27:30 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Ubuntu Bionic' database update.
2023/05/29 10:27:46 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Ubuntu Bionic' feed finished successfully.
2023/05/29 10:27:46 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Ubuntu Focal' database update.
2023/05/29 10:27:55 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Ubuntu Focal' feed finished successfully.
2023/05/29 10:27:55 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Debian Stretch' database update.
2023/05/29 10:27:59 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Debian Stretch' feed finished successfully.
2023/05/29 10:27:59 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Debian Buster' database update.
2023/05/29 10:28:05 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Debian Buster' feed finished successfully.
2023/05/29 10:28:05 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Red Hat Enterprise Linux 5' database update.
2023/05/29 10:28:11 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Red Hat Enterprise Linux 5' feed finished successfully.
2023/05/29 10:28:11 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Red Hat Enterprise Linux 6' database update.
2023/05/29 10:28:26 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Red Hat Enterprise Linux 6' feed finished successfully.
2023/05/29 10:28:26 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Red Hat Enterprise Linux 7' database update.
2023/05/29 10:28:42 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Red Hat Enterprise Linux 7' feed finished successfully.
2023/05/29 10:28:42 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Red Hat Enterprise Linux 8' database update.
2023/05/29 10:28:59 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Red Hat Enterprise Linux 8' feed finished successfully.
2023/05/29 10:28:59 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'JSON Red Hat Enterprise Linux' database update.
023/05/29 10:29:50 wazuh-modulesd:vulnerability-detector: WARNING: (5547): There was no valid response to '
https://access.redhat.com/labs/securitydataapi/cve.json?after=1999-01-01&per_page=1000&page=2' after '3' attempts. Trying the next page.
2023/05/29 10:31:31 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'National Vulnerability Database' database update.
2023/05/29 10:31:31 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'National Vulnerability Database' feed finished successfully.
2023/05/29 10:31:31 wazuh-modulesd:vulnerability-detector: INFO: (5400): Starting 'Microsoft Security Update' database update.
2023/05/29 10:31:45 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'Microsoft Security Update' feed finished successfully.
2023/05/29 10:31:45 wazuh-modulesd:vulnerability-detector: INFO: (5431): Starting vulnerability scan.
2023/05/29 10:54:20 wazuh-modulesd:vulnerability-detector: WARNING: (5547): There was no valid response to '
https://access.redhat.com/labs/securitydataapi/cve.json?after=1999-01-01&per_page=1000&page=6' after '3' attempts. Trying the next page.
2023/05/29 10:59:21 wazuh-modulesd:vulnerability-detector: INFO: (5431): Starting vulnerability scan.
2023/05/29 10:59:21 wazuh-modulesd:vulnerability-detector: ERROR: (5582): Unavailable vulnerabilities at the NVD database. The scan is aborted.
VD dashboard is never populated after this.