Hi @Brian_Landers ,
It is not a yes/no answer as it depends on some factors:
- First, although you rescanned the asset, the vulnerability was still not recalculated against that asset, so this is the main thing that needs to happen to reflect a change in the vulnerabilities affecting it. Currently, we are triggering the calculation once a week, starting at the weekend.
- Secondly and less obvious, although the vulnerability is recalculated, that does not guarantee it will disappear from the list. This is because the changes the patch applies need to be reflected in the vulnerability definition we retrieve from the NIST (concretely updating the CPEs related to the vulnerability), and this is not always easy, depending on the patch's changes. For example, updating the version of a software/library is something easy to track, so if that is the case it will be reflected once it is updated in the CVE, but things like a change in a configuration or a combination of several actions can be complicated to track.
We are working to improve on the two aspects above:
- Reducing the calculation cadence.
- On one hand (more complicated), trying to improve our analysis capabilities of the CVEs and, on the other hand, providing users the ability to manage the vulnerability status in relation to an asset.
Do not hesitate to contact me if you want to extend this information or with any other doubt on Security Insights.