Mondoo 10.4 is out!
๐ฅณ Mondoo 10.4 is out! This release includes improved VMware CVE detection, NPM package detection, performance improvements, and more!โ
Get this release: Installation Docs | Package Downloads | Docker Container
๐งน IMPROVEMENTSโ
VMware vSphere advisory & CVE detectionโ
Improved VMware vSphere advisory and CVE detection ensures you always have the latest advisories and CVEs flagged on both ESXi and vSphere assets.
Resource Updatesโ
aws.cloudtrailโ
- New
cloudWatchLogsLogGroupArn
field
gcp.project.pubsubService.snapshotโ
- Fix fetching the
expiration
field
npm.packagesโ
- New resource for fetching NPM packages installed on an asset
packagesโ
- New
files
field - New
cpe
field on Windows assets
Performance improvementsโ
Who doesn't like getting something for free? With Mondoo 10.4, you get your scan results not only faster, but using significantly less memory at the same time. In testing with large asset scans, memory usage has dropped from ~950MB to just ~200MB, while scan times were cut in half.
Save SBOMs to diskโ
Export SBOMs to a file with a new --output-target
flag:
$ cnquery sbom docker debian:12 -o cyclonedx-json --output-target debian-12.json
โ discover related assets for 1 asset(s)
debian:12 โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 100%
$ head debian-12.json
{
"$schema": "http://cyclonedx.org/schema/bom-1.5.schema.json",
"bomFormat": "CycloneDX",
"specVersion": "1.5",
"serialNumber": "urn:uuid:1685df36-e3f4-4174-b469-6bd9974a8c41",
"version": 1,
"metadata": {
"timestamp": "2024-02-20T10:49:41-08:00",
"tools": {
"components": [
New Azure snapshot scanning optionsโ
New options for Azure snapshot scanning give you additional control over how Mondoo performs the scan:
- Skip the cleanup and instead rely on Azure to perform the cleanup with a new
--skip-snapshot-cleanup
flag. - Scan snapshots that have already been attached to the VM with new
--skip-snapshot-setup
and--lun
flags.
Expanded NIST 800 compliance evidenceโ
AWS NIST Best Practices policies now feed directly into Compliance Hub, so NIST security findings can be part of your automatic evidence gathering for audits.
๐ BUG FIXES AND UPDATESโ
- Fix failures scanning container images.
- Fix fetching CPEs on VMware platforms.
- Display the correct SSH keys when remotely scanning hosts.
- Fix failures in the EOL policy and improve output when a system approaches EOL.
- Show just the severity icon for vulnerabilities instead of severity and scan result.
- Fix failures running the
shell
andrun
commands. - Improve reliability of console results pagination.
- Fix failures scanning Microsoft 365 and GitHub assets.
- Improve display of scan results in Azure and Microsoft 365 when the result is nil.
- Improve scan results output in the CIS AWS Foundations and Microsoft 365 Foundations benchmarks.
- Don't error if a Kubernetes container cannot be discovered.
- Add a property to the CIS AWS Foundations benchmark to allow controlling which ports are blocked on instances.
- Improve rendering of the asset page on wide displays.
- Fix incorrect CVE detection in .NET Runtime.
- Prevent empty titles in CVEs when the published CVE is incomplete.