Mondoo 10.3 is out!
๐ฅณ Mondoo 10.3 is out! This release includes Microsoft application vulnerability detection, expanded EOL/CVE detection, and more!โ
Get this release: Installation Docs | Package Downloads | Docker Container
๐ NEW FEATURESโ
Microsoft application CVE detectionโ
Expose additional critical vulnerabilities on your workstations and servers with new application vulnerability detection for Microsoft Edge, .NET Framework, and Visual Studio Code. Mondoo automatically flags vulnerable releases on the asset's Software tab. Links to relevant CVEs and Microsoft KB advisories help you understand the risk of outdated software releases in your environment.
๐งน IMPROVEMENTSโ
Paginate affected assetsโ
Have thousands of systems impacted by a security check? No problem with new asset pagination on the security check pages.
Performance improvementsโ
We refactored how Mondoo initiates scans, compiles CVE data, and executes the shell to make sure you get the best security results without waiting.
Reverse IP Lookup PTR record check in the Email Security policyโ
Gmail now requires a reverse IP Lookup PTR record for your domain to accept emails. The Mondoo Email Security policy now includes a new "Ensure Reverse IP Lookup PTR record is set (DNS Forward confirmed)" check so you can validate your domain is ready for these new stringent Gmail requirements.
Vulnerability data on Pop!_OSโ
Mondoo now supports CVE detection for Pop!_OS, the Ubuntu-derived distribution for System76 laptops.
Ubuntu 24.04 EOL and CVE supportโ
Mondoo now detects the EOL date for the upcoming Ubuntu 24.04 release as well as package CVE data. The Ubuntu release doesn't come out until April, but this way you'll be secure from day one.
๐ BUG FIXES AND UPDATESโ
- Simplify the description of EPSS data in CVE/Advisory console pages.
- Fix fields not displaying correctly in the
vulnmgmt.cves
resource. - Fix querying CloudWatch metrics alarms where the SNS topic does not exist in the
aws.cloudtrail.trails
resource. - Add a friendly error message when the
aws.cloudtrail
resource is called without an ARN. - Don't report the core provider as needing to be updated.
- Fix failures parsing time values in some AWS resources.
- Fix dict value parsing in the
gcp.buckets
resource. - Remove duplicate Jira resource autocompletion in the shell.
- Improve light mode in the registry and asset filters.
- Add an empty state to the asset insights when no policies or vulnerability data are available.
- Show an empty state for data queries when the scan result is an empty string, nil value, or 0.
- Prevent empty titles in Microsoft KBs.
- Fix scanning of AWS instances using SSM when the instance lacks tar.
- Improve remediation instructions in the Google Cloud (GCP) Security policy.
- Fix missing severities in some Scientific Linux security advisories.
- Support RHEL-based distributions in the CIS Distribution Independent Linux
Ensure updates, patches, and additional security software are installed
check. - Improve query output and reliability in the CIS Amazon Web Services (AWS) Foundations Benchmark and AWS Best Practices policies.
- Update Amazon 2023 and Fedora 38/39 EOL dates to reflect updated dates.
- Fix CVE detection for some packages on Ubuntu 23.10.
- Improve example cnspec/cnquery commands in the console.
- Fix fetching policies from the public registry.
- Fix failures in the CIS "Ensure journald service is enabled" check.
- Improve the check reliability and output in the CIS AWS Foundations policy.