Wazuh Vulnerability Detection module is not working

11 views
Skip to first unread message

Hasantha Gimhana

unread,
3:07 AM (5 hours ago) 3:07 AM
to Wazuh | Mailing List
Hi, 

I enabled Wazuh vulnerability detection module in ossec config file. But it does not work. Wazuh version is v 4.14.4.
Can you please help?
2026-05-04 12_07_56-Clipboard.png

Here is the ossec.conf content. 
Screenshot 2026-05-04 120330.png
Screenshot 2026-05-04 120430.png

Md. Nazmur Sakib

unread,
3:26 AM (5 hours ago) 3:26 AM
to Wazuh | Mailing List

Hello Hasantha,

The vulnerability configuration you have done for 4.14.4 is not correct.

From 4.8 and above, we use Wazuh CTI for feed update. So you do not need to mention each feed individually in the vulnerability configuration.


So, remove the current vulnerability configuration you have.
<vulnerability-detector>

   <enabled>yes</enabled>

   <interval>5m</interval>

   <min_full_scan_interval>6h</min_full_scan_interval>

   <run_on_start>yes</run_on_start>


   <!-- Ubuntu OS vulnerabilities -->

   <provider name="canonical">

      <enabled>yes</enabled>

      <os>trusty</os>

      <os>xenial</os>

      <os>bionic</os>

      <os>focal</os>

      <os>jammy</os>

      <update_interval>1h</update_interval>

   </provider>


 —-------------

      <update_interval>1h</update_interval>

   </provider>

</vulnerability-detector>



And add

<vulnerability-detection>

   <enabled>yes</enabled>

   <index-status>yes</index-status>

   <feed-update-interval>60m</feed-update-interval>

</vulnerability-detection>



Next, make sure you have the indexer connector configuration correctly configured.

<indexer>

  <enabled>yes</enabled>

  <hosts>

    <host>https://0.0.0.0:9200</host>

  </hosts>

  <ssl>

    <certificate_authorities>

      <ca>/etc/filebeat/certs/root-ca.pem</ca>

    </certificate_authorities>

    <certificate>/etc/filebeat/certs/filebeat.pem</certificate>

    <key>/etc/filebeat/certs/filebeat-key.pem</key>

  </ssl>

</indexer>



You can follow this Configuration document for the configuration detail.


Restart the manager to apply the changes.

Save the Wazuh indexer username(admin) and password into the Wazuh manager keystore using the Wazuh-keystore tool:

echo '<WAZUH_INDEXER_USERNAME>' | /var/ossec/bin/wazuh-keystore -f indexer -k username

echo '<WAZUH_INDEXER_PASSWORD>' | /var/ossec/bin/wazuh-keystore -f indexer -k password


Let me know if this solves your issue.

Reply all
Reply to author
Forward
0 new messages