Nodeware utilizes Security Content Automation Protocol (SCAP) based content for vulnerability detection that is created based on published Common Vulnerabilities and Exposures (CVEs) and vendor bulletins. This process begins when enough information is available about a vulnerability, including the affected platforms, software versions, and available remediation or mitigations.
Microsoft publishes most of their security information as part of their monthly update schedule, known to many as Patch Tuesday, which is the second Tuesday of each month. The CVE detections undergo development and testing, to confirm compatibility and accuracy for the target platforms, which can take several days.
Once detections hit our feeds, they are broken down into benchmarks for the various supported platforms and packaged for delivery. This process happens continually, based on feed updates. Scan content is synced prior to every scan, the very latest content will be included.
From bulletin to detection, the average delay is 4-8 days. There are several factors, such as the complexity of the vulnerability or prolonged NVD review periods with conflicting information that might further delay detection for a specific CVE, but we continually update our feeds, at a minimum daily, as new entries are added. Third-party application content is added throughout the month based on updates from the publisher (e.g., Mozilla, Google, Adobe, Zoom, etc.).
Comments
0 comments
Please sign in to leave a comment.