Forum Discussion
TVM still showing outdated vulnerabilities despite applications being up to date
hi alex_ri141 Yes, you're absolutely not alone—this is a known quirk with TVM (Threat & Vulnerability Management) in Microsoft Defender for Endpoint (MDE). Many organizations observe "stale CVEs" even after the related applications have been updated. Let's break it down and look at why this happens, and what you can do to force a re-evaluation.
Why Outdated CVEs Still Show in TVM
- TVM's scan logic is asynchronous and delayed
TVM pulls vulnerability data through a combination of: - File-based inventory scans
- Software version + CVE mapping
- Signals from cloud telemetry (Defender XDR portal)
However, the scan intervals can be non-immediate—especially for software that doesn't directly integrate well with MDE's inventory model.
- Inventory might be updated, but TVM logic lags
The Software Inventory pane may correctly reflect the updated version, but TVM may not yet reconcile the version delta against its CVE database (due to batching or analysis delay). - False positives in CVE mapping
Microsoft sometimes uses heuristics or version ranges that overlap in unexpected ways, especially for apps like Chrome, Firefox, Java, or Zoom. If TVM doesn’t know the vulnerability was fixed in a very specific patch or sub-build, it may continue to flag it incorrectly.
Best Practices to Force TVM to Refresh/Re-evaluate
Here are effective steps to prompt a TVM rescan or clean up outdated findings:
1.Restart the MDE Endpoint Service
Restart-Service Sense
- This will force the endpoint to reinitiate communication with Defender for Endpoint cloud, often triggering re-evaluation of software and CVEs.
2.Trigger Manual Device Scan
Start-MpScan -ScanType FullScan
or schedule a quick/full scan from the Defender portal (Live Response). This doesn't directly force a TVM scan but sometimes leads to updated telemetry on software status.
3.Re-onboard the device (last resort)
If the vulnerability refuses to clear despite matching all patching/version criteria:
- Offboard the device temporarily.
- Re-onboard using your preferred method (script/GPO/MEM).
- This often resets stale state—but should only be used when needed, as it is disruptive.
4.Use Microsoft Defender Vulnerability Management CLI
If you're licensed for MDVM standalone, you can use the TVM API to query or force updates.
5.Device Reboot (Helps in Some Cases)
- Especially useful when installing patches that require finalization upon restart.
- Also clears certain cached telemetry paths.
6.Known CVE Examples Affected
TVM occasionally over-reports on:
- Google Chrome & Chromium variants
- Adobe Acrobat Reader
- Java JDK/JRE
- Non-standard installers of Zoom, Firefox, etc.
This is because the TVM CVE mapping engine sometimes relies on version regexes or partial path matches, and the metadata doesn’t cleanly match what’s deployed.