Vulnerability detection

ThreatLockDown uses the Vulnerability Detection module to identify vulnerabilities in applications and operating systems running on endpoints.

This use case shows how ThreatLockDown detects unpatched Common Vulnerabilities and Exposures (CVEs) in the monitored endpoint.

For more information on this capability, check the vulnerability detection section of the documentation.

Infrastructure

Endpoint

Description

Ubuntu 22.04

The vulnerability detection module checks for vulnerabilities in the operating system and installed applications in this Linux endpoint.

Windows 11

The vulnerability detection module checks for vulnerabilities in the operating system and installed applications in this Windows endpoint.

Configuration

The Vulnerability Detection module is enabled by default. You can perform the following steps on the ThreatLockDown server to ensure that the ThreatLockDown Vulnerability Detection module is enabled.

  1. Open the /var/ossec/etc/ossec.conf file on the ThreatLockDown server. Check the Vulnerability Detection module is enabled:

    <vulnerability-detection>
       <enabled>yes</enabled>
       <index-status>yes</index-status>
       <feed-update-interval>60m</feed-update-interval>
    </vulnerability-detection>
    
    <indexer>
       <enabled>yes</enabled>
       <hosts>
          <host>https://0.0.0.0:9200</host>
       </hosts>
       <username>admin</username>
       <password>admin</password>
       <ssl>
          <certificate_authorities>
          <ca>/etc/filebeat/certs/root-ca.pem</ca>
          </certificate_authorities>
          <certificate>/etc/filebeat/certs/filebeat.pem</certificate>
          <key>/etc/filebeat/certs/filebeat-key.pem</key>
       </ssl>
    </indexer>
    
  2. If you made changes to the configuration, restart the ThreatLockDown manager.

    $ sudo systemctl restart wazuh-manager
    

Visualize the alerts

You can visualize the alert data in the ThreatLockDown dashboard. To do this, go to the Vulnerability Detection module, select Events, and click on any vulnerability to expand the document.