Forum Discussion
TVM still showing outdated vulnerabilities despite applications being up to date
Hi everyone,
we’re using Microsoft Defender for Endpoint with Threat & Vulnerability Management (TVM) enabled. Lately, we've noticed that certain vulnerabilities (e.g., CVEs in browsers or third-party software) continue to be flagged on devices, even though the affected applications have been updated weeks ago.
Example scenario:
The device is actively onboarded and reporting to Defender XDR
The application has been updated manually or via software deployment
The correct version appears under Software Inventory
However, the CVE still shows up under Weaknesses
Has anyone experienced similar behavior?
Are there any best practices to trigger a re-evaluation of vulnerabilities or force a TVM scan refresh?
Would a device reboot or restarting the MDE service help in this case?
Any insights, suggestions, or known workarounds would be greatly appreciated.
Thanks in advance!
2 Replies
- Lucifier0786Copper Contributor
Thanks for the detailed response. In our case, Python is installed and the endpoint team confirmed it’s already at the latest version. Still, TVM is flagging the recommendation to “Update Python to the latest version.”
What I observed:
There are some older Python libraries/packages present (e.g., from AppData or venv folders).
The software inventory shows the correct latest version, but the vulnerability still appears.
As a SOC analyst, I don’t have local access to validate file paths or registry.
👉 My follow-up questions:
Could the presence of old Python libraries (even if the main Python interpreter is updated) cause TVM to trigger the recommendation?
Is there a way (via KQL or portal) to find which version/path TVM is detecting that’s causing this?
Would reporting this as an “inaccuracy” help — or would Microsoft reject it since Python is technically installed?
Just trying to understand whether this is a mapping issue, residual file issue, or normal TVM delay.
hi alex_ri141 Yes, you're absolutely not alone—this is a known quirk with TVM (Threat & Vulnerability Management) in Microsoft Defender for Endpoint (MDE). Many organizations observe "stale CVEs" even after the related applications have been updated. Let's break it down and look at why this happens, and what you can do to force a re-evaluation.
Why Outdated CVEs Still Show in TVM
- TVM's scan logic is asynchronous and delayed
TVM pulls vulnerability data through a combination of: - File-based inventory scans
- Software version + CVE mapping
- Signals from cloud telemetry (Defender XDR portal)
However, the scan intervals can be non-immediate—especially for software that doesn't directly integrate well with MDE's inventory model.
- Inventory might be updated, but TVM logic lags
The Software Inventory pane may correctly reflect the updated version, but TVM may not yet reconcile the version delta against its CVE database (due to batching or analysis delay). - False positives in CVE mapping
Microsoft sometimes uses heuristics or version ranges that overlap in unexpected ways, especially for apps like Chrome, Firefox, Java, or Zoom. If TVM doesn’t know the vulnerability was fixed in a very specific patch or sub-build, it may continue to flag it incorrectly.
Best Practices to Force TVM to Refresh/Re-evaluate
Here are effective steps to prompt a TVM rescan or clean up outdated findings:
1.Restart the MDE Endpoint Service
Restart-Service Sense
- This will force the endpoint to reinitiate communication with Defender for Endpoint cloud, often triggering re-evaluation of software and CVEs.
2.Trigger Manual Device Scan
Start-MpScan -ScanType FullScan
or schedule a quick/full scan from the Defender portal (Live Response). This doesn't directly force a TVM scan but sometimes leads to updated telemetry on software status.
3.Re-onboard the device (last resort)
If the vulnerability refuses to clear despite matching all patching/version criteria:
- Offboard the device temporarily.
- Re-onboard using your preferred method (script/GPO/MEM).
- This often resets stale state—but should only be used when needed, as it is disruptive.
4.Use Microsoft Defender Vulnerability Management CLI
If you're licensed for MDVM standalone, you can use the TVM API to query or force updates.
5.Device Reboot (Helps in Some Cases)
- Especially useful when installing patches that require finalization upon restart.
- Also clears certain cached telemetry paths.
6.Known CVE Examples Affected
TVM occasionally over-reports on:
- Google Chrome & Chromium variants
- Adobe Acrobat Reader
- Java JDK/JRE
- Non-standard installers of Zoom, Firefox, etc.
This is because the TVM CVE mapping engine sometimes relies on version regexes or partial path matches, and the metadata doesn’t cleanly match what’s deployed.
- TVM's scan logic is asynchronous and delayed