Versioni attuali

Version Lifecycle-Status Patch-Level
GOS 24.10 New 24.10.6 (2025-09-15)
GOS 22.04 End-of-Life 22.04.29 (2025-07-07)
OPENVAS REPORT 1.2 New 1.2.2 (2025-10-23)
OpenSight OS 1.0 New 1.0.5 (2025-09-11)

Panoramica

OPENVAS SCAN soluzioni hardware
Versione GOS Modello Appliance
6500 6400 5400 5300 650 Rev. 1 650 Rev. 2 600 Rev. 1 600 Rev. 2 450 Rev. 1 450 Rev. 2 400 Rev. 1 400 Rev. 2 150 Rev. 1 150 Rev. 2 35
GOS 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔
GOS 22.04 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔

OPENVAS SCAN soluzioni virtuali
Versione GOS Modello Appliance
EXA PETA TERA DECA CENO 25V ONE BASIC FREE
GOS 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔
GOS 22.04 ✔✔

✔✔ consigliato | ✔ supportato | ✘ non supportato | Assistenza prevista

Calendario release

Changelog

2025-02-03: Greenbone OS 24.10

Current Patch Level: 24.10.6 (2025-09-15)

Lifecycle Status: New

24.10.6 (2025-09-15):

Note: An upgrade to this version requires a reboot of the system for virtual appliances.

  • Greenbone OS:
    • Improvement: a new Greenbone OS package signing key has been added to support upgrades to the upcoming new major version GOS 25.0. For upgrades to future GOS 24.10 patch-levels, the old package signing key will continue to be used (#GOS-2425).
    • Security fix: the included package cjson was upgraded from version 1.7.15-1+deb12u2 to version 1.7.15-1+deb12u4 (CVE-2025-57052).
    • Bug fix: an error was fixed where the deprecated GOS menu option Update all sensor protocols was shown unexpectedly (#GOS-2424).
  • Vulnerability Management:
    • Improvement: the Greenbone Enterprise Appliance product has been renamed to OPENVAS SCAN. In addition, the Greenbone Enterprise Feed will be referred to as the OPENVAS ENTERPRISE FEED. For more information see https://www.greenbone.net/en/blog/openvas-the-new-name-for-proven-greenbone-security/. Please note that this is an ongoing process and that some occurrences of the old product names may still occur. For all intents and purposes, the new and old names can be used interchangeably (#GEA-1088, #GOS-2397).
    • Improvement: the included package gvm-tools was updated to version 25.4.0 and the included package python-gvm was updated to version 26.6.0 (#GEA-1215, #GS-8660).
    • Bug fix: an error was fixed where the Delete Report button was not functional (#GEA-1240, #GS-8757).
    • Bug fix: an error was fixed where a duplicate key-value violation could occur when updating the scan configurations during a feed update (#GEA-1043, #GS-8117, #GS-8119).
    • Minor improvement: the About page of the web interface has been removed. The version information can now always be found in the lower left corner of the web interface (#GEA-1267).
    • Minor improvement: the included appliance manual has been updated to the current version from 2025-09-15 (#PR-1438).
    • Minor improvement: the text characters indicating “Gone”, “New”, Same” and “Changed” states in delta reports have been replaced with similar, high-resolution icons (#GEA-1206).
    • Minor improvement: the width of the user settings menu has been increased to accommodate longer text strings (#GEA-1202, #GEA-1268).
    • Minor bug fix: an error was fixed where sorting port lists by count was not working correctly (#GEA-1218).
    • Minor bug fix: an error was fixed where the default filter defined in the user settings was not applied on the Compliance Policies, Compliance Audits and Report Configs pages (#GEA-1167, #GEA-1168, #GEA-1169).
    • Minor bug fix: an error was fixed where log messages of the gvmd service were not filtered correctly, which could result in, for example, unwanted debug messages (#GEA-1233).
    • Minor bug fix: several wordings and translation in the web interface have been corrected (#GEA-1237).

24.10.5 (2025-09-02):

  • Greenbone OS:
    • Extension: the new Greenbone Enterprise MSP appliance model was added (#GOS-2429).
    • Security fix: the included package libxml2 was upgraded from version 2.9.14+dfsg-1.3~deb12u2 to version 2.9.14+dfsg-1.3~deb12u4 (CVE-2022-49043, CVE-2023-39615, CVE-2023-45322, CVE-2024-25062, CVE-2024-34459, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2025-32414, CVE-2025-32415, CVE-2025-7425).
    • Security fix: the included package unbound was upgraded from version 1.17.1-2+deb12u2 to version 1.17.1-2+deb12u3 (CVE-2024-33655, CVE-2024-8508, CVE-2025-5994).
  • Vulnerability Management:
    • Minor improvement: the included appliance manual has been updated to the current version from 2025-09-01 (#PR-1409).

24.10.4 (2025-08-26):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Improvement: IPv6 support has been added to the VPN functionality of GOS (#GOS-2331).
    • Improvement: the metrics for network routes in GOS have been changed, so that routes from manually configured gateways as well as manually configured routes are now always preferred over routes transmitted by DHCP servers (#GOS-2153).
    • Security fix: the included package systemd has been upgraded from version 252.36-1~deb12u1 to version 252.38-1~deb12u1 (CVE-2025-4598).
    • Security fix: the included package open-vm-tools has been upgraded from version 2:12.2.0-1+deb12u2 to version 2:12.2.0-1+deb12u3 (CVE-2025-22247).
    • Security fix: the Linux kernel has been upgraded from version 6.6.77-greenbone1 to version 6.6.92-greenbone1 for hardware appliances and from version 6.1.129-1 to version 6.1.147-1 for virtual appliances (CVE-2024-26618, CVE-2024-26783, CVE-2024-26807, CVE-2024-28956, CVE-2024-35790, CVE-2024-36903, CVE-2024-36927, CVE-2024-43840, CVE-2024-46751, CVE-2024-53203, CVE-2024-53209, CVE-2024-57945, CVE-2025-21645, CVE-2025-21839, CVE-2025-21931, CVE-2025-22062, CVE-2025-37819, CVE-2025-37890, CVE-2025-37897, CVE-2025-37901, CVE-2025-37902, CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37917, CVE-2025-37921, CVE-2025-37923, CVE-2025-37924, CVE-2025-37927, CVE-2025-37928, CVE-2025-37929, CVE-2025-37930, CVE-2025-37932, CVE-2025-37936, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951, CVE-2025-37953, CVE-2025-37959, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963, CVE-2025-37964, CVE-2025-37967, CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37990, CVE-2025-37991, CVE-2023-52857, CVE-2023-52927, CVE-2024-24855, CVE-2024-26656, CVE-2024-26767, CVE-2024-26982, CVE-2024-27056, CVE-2024-35866, CVE-2024-38611, CVE-2024-40973, CVE-2024-42129, CVE-2024-43831, CVE-2024-46772, CVE-2024-47753, CVE-2024-47754, CVE-2024-50056, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-58002, CVE-2024-58005, CVE-2024-58079, CVE-2024-58090, CVE-2025-21702, CVE-2025-21712, CVE-2025-21721, CVE-2025-21756, CVE-2025-21838, CVE-2025-21844, CVE-2025-21846, CVE-2025-21848, CVE-2025-21855, CVE-2025-21858, CVE-2025-21859, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-21866, CVE-2025-21867, CVE-2025-21871, CVE-2025-21875, CVE-2025-21877, CVE-2025-21878, CVE-2025-21881, CVE-2025-21887, CVE-2025-21891, CVE-2025-21898, CVE-2025-21899, CVE-2025-21904, CVE-2025-21905, CVE-2025-21909, CVE-2025-21910, CVE-2025-21912, CVE-2025-21913, CVE-2025-21914, CVE-2025-21916, CVE-2025-21917, CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926, CVE-2025-21928, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937, CVE-2025-21938, CVE-2025-21941, CVE-2025-21943, CVE-2025-21944, CVE-2025-21945, CVE-2025-21947, CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21968, CVE-2025-21970, CVE-2025-21971, CVE-2025-21975, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980, CVE-2025-21981, CVE-2025-21986, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993, CVE-2025-21994, CVE-2025-21996, CVE-2025-21997, CVE-2025-21999, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22010, CVE-2025-22014, CVE-2025-22015, CVE-2023-53034, CVE-2024-36908, CVE-2024-46733, CVE-2024-46742, CVE-2024-46753, CVE-2024-46774, CVE-2024-46816, CVE-2024-46823, CVE-2024-50063, CVE-2025-21853, CVE-2025-22025, CVE-2025-22027, CVE-2025-22033, CVE-2025-22035, CVE-2025-22038, CVE-2025-22040, CVE-2025-22041, CVE-2025-22042, CVE-2025-22044, CVE-2025-22045, CVE-2025-22049, CVE-2025-22050, CVE-2025-22054, CVE-2025-22055, CVE-2025-22056, CVE-2025-22058, CVE-2025-22060, CVE-2025-22063, CVE-2025-22066, CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075, CVE-2025-22079, CVE-2025-22081, CVE-2025-22086, CVE-2025-22088, CVE-2025-22089, CVE-2025-22093, CVE-2025-22095, CVE-2025-22097, CVE-2025-22126, CVE-2025-23136, CVE-2025-23138, CVE-2025-37785, CVE-2025-37838, CVE-2025-38152, CVE-2025-38575, CVE-2025-38637, CVE-2025-39728, CVE-2025-39735, CVE-2024-36350, CVE-2024-36357, CVE-2024-36913, CVE-2024-41013, CVE-2024-56758, CVE-2024-57883, CVE-2025-21816, CVE-2025-22119, CVE-2025-27558, CVE-2025-37958, CVE-2025-38000, CVE-2025-38001, CVE-2025-38003, CVE-2025-38004, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052, CVE-2025-38058, CVE-2025-38061, CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079, CVE-2025-38083, CVE-2025-38084, CVE-2025-38085, CVE-2025-38086, CVE-2025-38088, CVE-2025-38090, CVE-2025-38097, CVE-2025-38100, CVE-2025-38102, CVE-2025-38103, CVE-2025-38107, CVE-2025-38108, CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38118, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38124, CVE-2025-38126, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38151, CVE-2025-38153, CVE-2025-38154, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160, CVE-2025-38161, CVE-2025-38163, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180, CVE-2025-38181, CVE-2025-38183, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215, CVE-2025-38218, CVE-2025-38219, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38227, CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38236, CVE-2025-38239, CVE-2025-38245, CVE-2025-38249, CVE-2025-38251, CVE-2025-38257, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263, CVE-2025-38273, CVE-2025-38275, CVE-2025-38277, CVE-2025-38280, CVE-2025-38282, CVE-2025-38285, CVE-2025-38286, CVE-2025-38293, CVE-2025-38298, CVE-2025-38300, CVE-2025-38304, CVE-2025-38305, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38334, CVE-2025-38336, CVE-2025-38337, CVE-2025-38342, CVE-2025-38344, CVE-2025-38345, CVE-2025-38346, CVE-2025-38348, CVE-2025-38350, CVE-2025-38352, CVE-2025-38354, CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38371, CVE-2025-38375, CVE-2025-38377, CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387, CVE-2025-38389, CVE-2025-38391, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38403, CVE-2025-38404, CVE-2025-38406, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424, CVE-2025-38425, CVE-2025-38428, CVE-2025-38430, CVE-2025-38437, CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445, CVE-2025-38448, CVE-2025-38451, CVE-2025-38455, CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38477, CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38494, CVE-2025-38495, CVE-2025-38497, CVE-2025-38498, CVE-2025-38499).
    • Security fix: the Intel microcode of the Greenbone Enterprise 6500 R2, 5400 R2, 650 R2, 600 R2, 450 R2, 400 R2 appliance models has been upgraded to the current version (CVE-2024-28956, CVE-2024-43420, CVE-2024-45332, CVE-2025-20012, CVE-2025-20054, CVE-2025-20103, CVE-2025-20623, CVE-2025-24495).
    • Security fix: the included package redis was upgraded from version 5:7.0.15-1~deb12u3 to version 5:6.0.16-1+deb11u5 (CVE-2025-27151, CVE-2025-32023, CVE-2025-48367).
    • Security fix: the included package gnutls was upgraded from version 3.7.9-2+deb12u4  to version 3.7.9-2+deb12u5 (CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395).
    • Security fix: the included package libxslt was upgraded from version 1.1.35-1+deb12u1 to version 1.1.35-1+deb12u2 (CVE-2023-40403, CVE-2025-7424).
    • Bug fix: an error was fixed where the flash image could not be written to the flash partition on the appliance models Greenbone Enterprise 6500 R2 and Greenbone Enterprise 5400 R2 (#GOS-2346).
    • Bug fix: an error was fixed where the password of a web user was displayed in clear text in the system logs when changing the password (#GOS-2407, #GS-8633).
    • Bug fix: an error was fixed where trying to view the setting Setup > Network > IP in the GOS administration menu on an ARM-based appliance caused the GOS administration menu to crash (#GOS-2386).
    • Bug fix: an error was fixed where installing gsm-debug on pure sensor appliances caused all components of the GVM stack to be installed as well (#GOS-2265).
    • Bug fix: an error was fixed where a false-positive vulnerability “DNS Cache Snooping” was detected when scanning a network interface in the scan1 namespace (#GOS-2269, #GS-8077).
    • Minor improvement: the system logs for the openvasd scanner were added to the support package (#GOS-2292).
    • Minor bug fix: an error was fixed where the web interface login was not shown in the system logs (#GOS-2332).
  • Vulnerability Management:
    • Major improvement: an alternate mode of querying scan results during scans has been added, potentially providing improvements in the use of system resources, especially when running many scans in parallel. The new mode is not enabled by default, but can be enabled via the GOS state variable scan_queue if desired. The GOS state variables max_active_scan_handlers and scan_handler_active_time provide further fine-tuning options, if scan_queue is enabled (#GEA-1069, #GEA-1106, GOS-2358).
    • Major bug fix: an error was fixed where the information that the Greenbone Community Feed is used was displayed on the web interface, even though the Greenbone Enterprise Feed was used (#GEA-1119).
    • Improvement: the language switch between English and German on the web interface has been improved and made smoother (#GEA-1034).
    • Improvement: if not all entries of a drop-down menus can be displayed, a scroll bar is now shown when moving the cursor over the menu (#GEA-907).
    • Improvement: when creating Kerberos credentials, it is now checked if the format of the KDC(s) matches the valid formats. Is is not possible to save Kerberos credentials if the KDC(s) have an invalid format. An appropriate error message is displayed in this case (#GEA-1128).
    • Improvement: the way EPSS scores are displayed has been changed to comply with FIRST’s recommended display format. The score is now displayed as a percentage and the percentile is displayed as a whole-numbered ordinal number (#GEA-1132).
    • Improvement: the colors of the severity classes have been adjusted to match those of OPENVAS REPORT and OPENVAS VIEW (#GEA-1052).
    • Improvement: when signing in after a session timeout the last opened page is now displayed instead of the Dashboards page (#GEA-973).
    • Bug fix: an error was fixed where the EPSS scores were not displayed in the report of a scan (#GEA-930, #GS-7696, #GS-8189, #GS-8306, #GS-8043).
    • Bug fix: an error was fixed where the Performance page could not be opened and an error was displayed instead (#GEA-1055, #GEA-1064, GS-8169, #GS-8303, #GS-8601).
    • Bug fix: an error was fixed where triggering a Sourcefire Connector alert that was missing the PKCS#12 certificate caused a backtrace error (#GEA-1087).
    • Bug fix: an error was fixed where the Verify Scanner functionality in the web interface always returned an error for Greenbone Sensors, even if they were configured correctly (#GEA-1029, #GS-8204, #GS-8146).
    • Bug fix: an error was fixed where creating a large number of tasks exhausted the available PostgreSQL connections, causing subsequent problems (#GEA-1025).
    • Bug fix: an error was fixed where the menus Alerts and Schedules were incorrectly available on the web interface of the appliance model Greenbone Free (#GEA-1053).
    • Bug fix: an error was fixed where the menu Remediation Tickets was incorrectly available on the web interface of all appliance models (#GEA-1008).
    • Bug fix: an error was fixed where the information that the feed is currently being synchronized was repeatedly displayed on the web interface, even though the feed was not actually being synchronized (#GEA-1010, #GS-8105, #GS-7870).
    • Bug fix: an error was fixed where using the method modify_filter in gvm-python caused a traceback error (#GEA-1077, #GS-8264).
    • Bug fix: an error was fixed where the About page could not be opened and an error was displayed instead (#GEA-1112).
    • Bug fix: an error was fixed where the NVT OID was not already filled out when creating a new note from a result or a VT (#GEA-1133).
    • Bug fix: an error was fixed where it was not possible to create a new target from the Hosts page (#GEA-1120).
    • Bug fix: an error was fixed where an error message could be displayed when opening the New Task dialog on the Tasks (#GEA-1063, #GS-7646).
    • Bug fix: an error was fixed where it was not possible to create a filter for the resource type Vulnerability (#GEA-1164).
    • Bug fix: an error was fixed where the Performance page did not contain any graphs, neither for the appliance itself nor for any connected sensors (#GEA-1197, #GEA-1221).
    • Bug fix: an error was fixed where uploading a custom file containing credentials to be tested during a scan to a scan configuration was not possible (#GEA-1036, #GS-8094).
    • Bug fix: an error was fixed where it was not possible to edit compliance policies and scan configurations or view their details pages (#GEA-1195).
    • Bug fix: an error was fixed where the VT an override was created for was not correctly displayed when editing the override (#GEA-1198).
    • Bug fix: an error was fixed where the Trashcan page could not be opened and an error was displayed instead (#GEA-1194).
    • Bug fix: an error was fixed where custom report configurations were not used for reports sent with an alert (#GEA-1155).
    • Bug fix: an error was fixed where it was not possible to create a new schedule (#GEA-1187).
    • Bug fix: an error was fixed where the GMP function get_report returned an unexpected keyword (#GEA-1172).
    • Bug fix: an error was fixed where saving the user settings was not possible due to invalid input (#GEA-1031).
    • Bug fix: an error was fixed where sorting by EPSS score, EPSS percentile or solution type in delta reports did not work as expected (#GEA-1192).
    • Bug fix: an error was fixed where changing the user interface language reset the sorting order of delta reports (#GEA-1207).
    • Minor improvement: line breaks within words in report names have been removed (#GEA-1026).
    • Minor improvement: the notification indicating that the Greenbone Community Feed is being used has been moved, so that it no longer overlaps with the top menu bar (#GEA-1028).
    • Minor improvement: the included appliance manual has been updated to the current version from 2025-08-04 (#PR-1321).
    • Minor improvement: all settings of Kerberos credentials (for example, realm and KDC(s)) are now shown on the credential’s details page (#GEA-1129).
    • Minor improvement: on the Reports page, the icon for deleting a report has been replaced to better reflect that reports are deleted immediately without moving them to the trashcan (#GEA-1212).
    • Minor bug fix: an error was fixed where the notification indicating that the Greenbone Community Feed is being used was shown too often (#GEA-1231).
    • Minor bug fix: an error was fixed where it was not possible to enter a decimal divider for the new severity when creating an override (#GEA-1059).
    • Minor bug fix: an error was fixed where the time zone was not correctly displayed after logging in (#GEA-1051).
    • Minor bug fix: an error was fixed where the Users page could show an error message due to a missing translation function (#GEA-1056).
    • Minor bug fix: an error was fixed where the Operating Systems by Vulnerability Score chart was not available on the Operating Systems page (#GEA-1067).
    • Minor bug fix: an error was fixed where the error messages when creating Kerberos credentials where inconsistent (#GEA-1005).
    • Minor bug fix: an error was fixed where in some cases the dialog with the user settings could not be closed by clicking Save if no changes were made (#GEA-1048).
    • Minor bug fix: an error was fixed where attempting to delete the hour or minute entry of the start or end time of a schedule would cause the Schedules page to crash (#GEA-948).
    • Minor bug fix: an error was fixed where Kerberos credentials were not always displayed on the target details page (#GEA-1066).
    • Minor bug fix: an error was fixed where a CVSS base vector was shown as “(null)” if no vector existed (#GEA-888).
    • Minor bug fix: an error was fixed where moving multiple objects to the trashcan did not show a progress indicator anymore (#GEA-1065).
    • Minor bug fix: an error was fixed where the German column header “Falsch-Positiv” in a scan report was not readable (#GEA-1127).
    • Minor bug fix: an error was fixed where various LDAP settings displayed “(null)” when uploading an invalid LDAP certificate (#GEA-1072).
    • Minor bug fix: an error was fixed where it was not possible to add a tag to port lists using the Apply to selection function (#GEA-1118).
    • Minor bug fix: an error was fixed where the menu item of the currently open page in the menu on the left was no longer selected when sub-items such as detail pages were opened (#GEA-1135).
    • Minor bug fix: an error was fixed where dashboards on the Dashboards page could only be renamed if multiple dashboards existed (#GEA-1191).
    • Minor bug fix: an error was fixed where filters created for tags were not displayed on the Tags page and therefore could not be applied (#GEA-1165).
    • Minor bug fix: an error was fixed where the default filter defined in the user settings was not applied on the Port Lists page (#GEA-1166).
    • Minor bug fix: an error was fixed where the name of an alert was deleted if the alert was modified via the GMP API and no alert name or comment were provided (#GEA-1082, #GS-7747).
  • Vulnerability Scanning:
    • Improvement: support for Arch Linux has been added to the openvasd-based Notus scanner (#SC-1240).
    • Improvement: an option to limit the memory usage of vulnerability test scripts has been added. It can be set via the GOS state variable max_mem_kb, which defines the maximum amount of memory in megabyte allowed to use for a single script. Per default no limit is set (#SC-1312, #GOS-2408).
    • Bug fix: an error was fixed where a segmentation fault could sometimes occur when handling virtual hosts (#SC-1334).
    • Bug fix: an error was fixed where a segmentation fault could sometimes occur when handling openvasd-based Notus checks (#SC-1300, #GS-8144).
    • Minor improvement: for Known Exploited Vulnerabilities (KEV) of the Cybersecurity and Infrastructure Security Agency (CISA), metadata support has been added for vulnerability tests (#SC-1112).
    • Minor bug fix: an error was fixed where the IP address was missing in the “too many timeouts. This port will be set to closed.” log message (#SC-1313).

24.10.3 (2025-07-07):

  • Greenbone OS:
    • Major security fix: the included package sudo was upgraded from version 1.9.13p3-1+deb12u1 to version 1.9.13p3-1+deb12u2 (CVE-2025-32462, CVE-2025-32463, #GS-8463).
    • Bug fix: a new scanner version was introduced with GOS 22.04.28 which was not included in GOS 24.10.2. Due to that, no switch release from GOS 22.04 to GOS 24.10 was possible. The scanner version was now updated from version 23.16.1-gos2410~1 to version 23.20.1-gos2410~1 to fix this issue (#GOS-2364, #GS-8453, #GS-8468).
  • Vulnerability Management:
    • Minor improvement: the included appliance manual was updated to the current version from 2025-07-03 (#PR-1318).

24.10.2 (2025-04-14):

Note: An upgrade to this version requires a reboot of the system for virtual appliances.

  • Greenbone OS:
    • Extension: the new Greenbone Enterprise 150 R2 appliance model was added (#GOS-2200).
    • Improvement: importing a beaming image from a newer GOS patch level in an older GOS patch level could result in problems. The import of such beaming images is now no longer allowed (#GOS-2241).
    • Improvement: the size of the database, valuable, backup and log partitions was increased for new installations of the appliance models Greenbone Enterprise 5400 R1 and Greenbone Enterprise 6500 R1. The partition sizes now match those of the corresponding R2 models (#GOS-2170, #GS-7628, #GS-7900).
    • Improvement: the included package gvm-tools was updated to version 25.3.0 and the included package python-gvm was updated to version 26.1.1 (#PR-1226).
    • Security fix: the included package libxslt was upgraded from version 1.1.35-1 to version  1.1.35-1+deb12u1 (CVE-2024-55549, CVE-2025-24855).
    • Bug fix: if the appliance model Greenbone Enterprise 35 has been installed with GOS 21.04 or earlier, the fstrim service was not enabled. It has been enabled for these cases also to resolve various disk issues (#GOS-2224, #GOS-2208, #GS-7777).
    • Bug fix: an error was fixed where the console start screen of a Greenbone Enterprise 25V claimed that a web interface was available (#GOS-2092).
    • Bug fix: an error was fixed where the optional package gsm-debug could not be installed (#GOS-2234).
    • Minor improvement: for all hardware appliance models except the Greenbone Enterprise 35 the /tmp directory has been moved to its own partition (#GOS-108).
    • Minor bug fix: an error was fixed where support packages did not include all expected Postgres debug information (#GOS-2190).
    • Minor bug fix: an error was fixed where the self-check for other logged in admins was always shown as failed in support packages, even if the self-check was actually successful (#GOS-2222).
  • Vulnerability Management:
    • Improvement: dynamic notifications were added to the web interface. For various types of actions, such as starting, stopping or resuming a scan task or audit, deleting, cloning or exporting any object, and for some informational messages from Greenbone a message appears in the upper right corner (#GEA-934, #GEA-1017).
    • Bug fix: an error was fixed where various dialogs in the web interface displayed an error if they contained user-defined objects that consisted only of numbers (#GEA-917, #GEA-922, #GS-7646, #GS-7749, #GS-7824).
    • Bug fix: an error was fixed where the selection of which VT families to include in a scan configuration or compliance policy was revoked when other settings were changed in the same step (#GEA-952).
    • Bug fix: an error was fixed where input boxes of the dialog for editing a scan configuration reacted very slowly (#GEA-884).
    • Bug fix: an error was fixed where no warning message was displayed if a password for a web user was not complex enough, even though the password complexity was enabled via the GOS menu (#GEA-782).
    • Bug fix: an error was fixed where changes to the timeout values within a scan configuration or compliance policy were not applied when scanning (#GEA-799, #GS-7032, #GS-7520, #GS-7776).
    • Bug fix: an error was fixed where too many results were displayed for “Network Vulnerability Test Preferences” when using the search function in a scan configuration or compliance policy (#GEA-950).
    • Bug fix: an error was fixed where the dates of overrides were not correct in the dashboard diagrams of the Overrides page (#GEA-945, #GS-7738).
    • Minor improvement: the design of multi-line entries in drop-down lists was improved, so that the entries do not get cropped anymore (#GEA-831, #GS-7756).
    • Minor improvement: the included appliance manual was updated to the current version from 2025-04-10 (#PR-1252).
    • Minor improvement: the link to the user manual in the web interface was moved to the upper right menu bar and is now opened in a separate browser tab (#GEA-951).
    • Minor improvement: the link to the Greenbone website in the footer of the web interface now leads to the English website if the language of the web interface is set to English (#GEA-944).
    • Minor bug fix: an error was fixed where the dark screen overlay used with dialog boxes became darker when multiple nested dialogs were opened (#GEA-962).
  • Vulnerability Scanning:
    • Extension: a new credential type for Kerberos authentication on Microsoft Windows systems was added. Authenticated scans via Kerberos will still be done with the help of the SMB protocol. The already existing SMB credentials, which use NT (New Technology) LAN Manager (NTLM) for authentication, were renamed to SMB (NTLM) on the web interface to avoid confusion. In order to enable authentication via Kerberos on a target, the appliance must use a DNS server that is capable of doing a reverse lookup of the target and the target must be part of a functioning Microsoft Windows domain with a working domain controller, DNS infrastructure, and network. If the authentication via Kerberos fails, NTLM authentication will be tried as a fallback (#SC-1131, #GEA-894, #GS-6331).

24.10.1 (2025-03-12):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Major bug fix: an error was fixed where the Redis service saved unplanned dataset snapshots on the hard disk and thus filled up the root volume of the disk. All such existing dataset snapshots will also be removed when upgrading to GOS 24.10.1 or later (#GOS-2183, #GOS-2194, #GS-7687, #GS-7690, #GS-7697, #GS-7794).
    • Improvement: the included package gvm-tools was updated to version 25.2.0 and the included package python-gvm was updated to version 26.1.0. These versions are required to ensure compatibility with GMP 22.6 and GOS 24.10 (#PR-1149).
    • Improvement: self-signed certificates and certificate signing requests (CSRs) for HTTPS now use a RSA key size of 4096 bit. This change does not apply to already created certificates and CSRs. Only newly generated self-signed certificates and CSRs with GOS 24.10.1 or later will use 4096 bit (#GOS-2078, #GS-7235).
    • Security fix: the Linux kernel was upgraded from version 6.6.64-greenbone1 to version 6.6.77-greenbone1 for hardware appliances and from version 6.1.124-1 to version 6.1.128-1 for virtual appliances (CVE-2024-36899, CVE-2024-49994, CVE-2024-50014, CVE-2024-50047, CVE-2024-50164, CVE-2024-50304, CVE-2024-53124, CVE-2024-53128, CVE-2024-53170, CVE-2024-53229, CVE-2024-53234, CVE-2024-53685, CVE-2024-56551, CVE-2024-56599, CVE-2024-56608, CVE-2024-56631, CVE-2024-56664, CVE-2024-56703, CVE-2024-57887, CVE-2024-57892, CVE-2024-57904, CVE-2024-57906, CVE-2024-57907, CVE-2024-57908, CVE-2024-57910, CVE-2024-57911, CVE-2024-57912, CVE-2024-57913, CVE-2024-57915, CVE-2024-57916, CVE-2024-57917, CVE-2024-57922, CVE-2024-57925, CVE-2024-57929, CVE-2024-57939, CVE-2024-57940, CVE-2024-57948, CVE-2025-21631, CVE-2025-21636, CVE-2025-21637, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21646, CVE-2025-21647, CVE-2025-21648, CVE-2025-21653, CVE-2025-21655, CVE-2025-21660, CVE-2025-21662, CVE-2025-21664, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669, CVE-2025-21671, CVE-2025-21675, CVE-2025-21678, CVE-2025-21680, CVE-2025-21681, CVE-2025-21683).
    • Security fix: the included package openssh was upgraded from version 1:9.2p1-shredder+2 (1:9.2p1-2+deb12u2) to version 1:9.2p1-2+deb12u5 (CVE-2025-26465, CVE-2024-6387).
    • Security fix: the included package libgnutls was upgraded from version 3.7.9-2+deb12u3 to version 3.7.9-2+deb12u4 (CVE-2024-12243).
    • Security fix: the included package libtasn was upgraded from version 4.19.0-2 to version 4.19.0-2+deb12u1 (CVE-2024-12133).
    • Bug fix: an error was fixed where VLAN IDs in network namespaces could conflict, causing subsequent networking problems (#GOS-2169, #GOS-2180, #GS-7575, #GS-7633, #GS-7678, #GS-7691).
    • Bug fix: an error was fixed where the kernel did not allow port binding to an IPv6 address in a tentative state. This could lead to subsequent problems, for example system services not starting. A waiting period is now used to ensure the address is in the expected state (#GOS-2187, #GS-7708).
    • Bug fix: an error was fixed where GOS upgrades from GOS 22.04 to the new major version GOS 24.10 were not possible on Huawei FusionCompute x86-64 (#GOS-2080, #GS-7566).
    • Bug fix: an error was fixed where GOS 24.10 did not correctly identify itself as GOS 24.10 when acting as an SSH client or server (#GOS-2138).
  • Vulnerability Management:
    • Major improvement: the performance of SCAP feed updates was considerably improved (#GEA-886, #GEA-899, #GEA-928).
    • Improvement: a search bar was added to the dialog for creating or editing a scan configuration or compliance policy. It can be used to search for VT families, scanner preferences and VT preferences (#GEA-880).
    • Improvement: an action icon for accessing the general settings of a scan configuration was added to the page Scan Configs. Clicking on it directly opens the VT Familiy Settings (#GEA-879).
    • Improvement: for the export of scan reports and audit reports, only those report formats that are compatible with the corresponding report type are now available (#GEA-873).
    • Bug fix: an error was fixed where CVEs for which no CPEs have been assigned were not updated correctly during feed updates (#GEA-981).
    • Bug fix: an error was fixed where the link to the user manual under Help > User Manual did not work (#GEA-892).
    • Bug fix: an error was fixed where cloning a compliance policy from a details page resulted in a “Page Not Found” error, although the policy was successfully cloned (#GEA-874).
    • Bug fix: an error was fixed where selecting the same item from any drop-down list removed the entry entirely (#GEA-861).
    • Bug fix: an error was fixed where the selected report format was not displayed in the dialog for creating a new report configuration (#GEA-838).
    • Bug fix: an error was fixed where the results of a CVE scan showed no detection methods (#GEA-887).
    • Bug fix: an error was fixed where reports exported in the report formats Verinice ISM and Verinice ISM all results did not contain any attached report (#GEA-840).
    • Bug fix: an error was fixed where SQL error messages could occur when loading results that included Windows Local Security Checks.
    • Minor improvement: the font size on the web interface was made consistent (#GEA-830).
    • Minor improvement: the links to the user manual were updated for new pages of the web interface that were introduced with GOS 24.10 (#GEA-869).
    • Minor improvement: the design of the badges that show the number of a resource on a details page, for example the number of reports for a task, was improved to make the underlying icons more visible (#GEA-860).
    • Minor improvement: required input boxes when creating or editing a ticket are now marked with an asterisk, as the previous labels could be interpreted as error messages even though there was no error (#GEA-874).
    • Minor improvement: a log message was added to indicate when the gvmd service is ready to accept GMP connections.
    • Minor improvement: the included appliance manual was updated to the current version from 2025-03-04 (#PR-1196).
    • Minor security fix: the link in the footer that leads to the Greenbone website now uses HTTPS (#GEA-860).
    • Minor bug fix: an error was fixed where it was possible to create tags of the wrong sub-type for reports, tasks, audits, scan configurations and policies via the GMP API (#GEA-871).
  • Vulnerability Scanning:
    • Bug fix: an error was fixed where the OpenVAS scanner tried to allocate very large amounts of memory when running vulnerability tests that use and store files on target systems (#SC-745, #GS-3371).

24.10.0 (2025-02-03):

Note: Please follow the instructions in the user manual to upgrade to this major version. After the upgrade, a reboot of the system is required.

Product Portfolio

The appliance models Greenbone Enterprise 400/450/600/650 R1, Greenbone Enterprise 5300/6400 and Greenbone Enterprise 150 do not support GOS 24.10.

Secure Boot

GOS 24.10 supports Secure Boot for virtual appliances.

  • On Huawei FusionCompute, GOS 24.10 does not yet support Secure Boot.
  • On appliances that are shipped with GOS 24.10, Secure Boot is enabled by default, with the exception of appliances for Oracle VirtualBox.
  • On appliances that were upgraded from GOS 22.04 to GOS 24.10 and on new appliances for Oracle VirtualBox, Secure Boot has to be activated in the settings of the used hypervisor.

To enable Secure Boot for appliances on which it is not enabled by default, the following must be considered:

  • At least the hypervisor versions specified in the sub-chapters of Chapter 4.1 of the manual must be used.
  • The following settings must be made on the respective hypervisor:
    • VMware vSphere Hypervisor (ESXi):
      • Guest OS Family must be set to Linux.
      • Guest OS Version must be set to at least Debian GNU/Linux 11 (64-bit).
    • VMware Workstation Pro and Workstation Player:
      • Guest operating system must be set to Linux.
      • Guest operating system Version must be set to at least Debian GNU/Linux 11 (64-bit).
    • Microsoft Hyper-V:
      • The virtual machine must be a generation 2 virtual machine.
      • Secure Boot Template must be set to Microsoft UEFI Certificate Authority.
    • Oracle VirtualBox:
      • After enabling Secure Boot the first time, the Reset Keys to Default button must be pressed and the subsequent dialog must be confirmed.
  • To enable Secure Boot itself, refer to the technical documentation of the used hypervisor.

Encrypted Airgap FTP

GOS 24.10 introduces the option to encrypt Airgap FTP. Encryption is done via SSH-based SFTP.

When adding a server for Airgap, it is now possible to specify whether FTP or SFTP should be used. The menu options offered in the Airgap menu then depend on this selection.

sshd Configuration Options

With GOS 24.10, the algorithms and ciphers used by the SSH daemon can be configured via the GOS administration menu. The following settings are available:

  • Ciphers
  • Host key signature algorithms
  • Key exchange algorithms
  • MAC algorithms
  • Public key signature algorithms

Networking Mode

The old networking mode that was superseded by the networking mode gnm (GOS Network Manager) with GOS 21.04 has been removed. Upgrading from GOS 22.04 to GOS 24.10 is not possible if the old networking mode is still in use with GOS 22.04.

Superuser Password

With GOS 24.10, the method of setting the superuser password is changed. It is also no longer restored when restoring a beaming image or a backup, but remains unchanged from its previous value before the import or restore.

The superuser password can be changed as described in Chapter 6.4.2.1 of the manual.

Web Interface

New Design of the Web Interface

GOS 24.10 introduces a new design for the web interface. The main navigation bar has been moved to a vertical menu on the left side of the screen, and the layout and color of all pages and dialogs has been improved to enhance clarity and usability. In addition, several new functionalities have been added (see below).

Configurable Report Formats

GOS 24.10 adds the feature Report Configs to customize report formats. The following report formats can be customized:

  • Customizable CSV Results: customization of included columns and formula handling
  • Topology SVG: customization of graph type and node distance
  • Verinice ISM: customization of attached report formats and the sent message
  • Verinice ISM all results: customization of attached report formats and the sent message

For the supported report formats, the report configuration can be selected when exporting a report or using an alert that includes the sending of a report.

EPSS Support

With GOS 24.10, EPSS (Exploit Prediction Scoring System) scores are added to CVEs and vulnerability tests. EPSS is a measure of a vulnerability’s likelihood of exploitation.

CVEs and VTs are now assigned a score and a percentile. The score indicates the probability of attempts to exploit a vulnerability being observed in the next 30 days and is a number between 0 and 1. The higher the value, the greater the probability that a vulnerability will actually be exploited. The percentile indicates the proportion of vulnerabilities that were rated the same or lower than the vulnerability. This helps putting the score into context.

CVSS v4.0 Support

With GOS 24.10, CVSS v4.0 will be supported. However, since CVSS v4.0 is still in the early stages of industry-wide adoption, CVSS v4.0 data is not yet available in the feed.

Dedicated Page for Audit Reports

GOS 24.10 adds a new sub-page to the Resilience menu of the web interface: Compliance Audit Reports.

This page contains the reports of compliance audits, equivalent to the Reports page, which contains the reports for scan tasks. The table on the page displays an overall compliance assessment of the target system, as well as the number of results per compliance level Yes, No and Incomplete.

The details view of a report is also equivalent to that of a scan task. It contains all detected results together with an assessment of whether the requirement has been met, not met or only partially met.

Filters and tags were adjusted and are not separate between audit and scan reports. Additionally, tag types for compliance policies and audits were added.

Notus Scanner Replaced by openvasd

With GOS 24.10, the Notus Scanner is replaced by openvasd. Implemented in the Rust programming language, openvasd offers a more secure and robust experience. It is the first step towards implementing all OpenVAS scanner functionalities in Rust in the future.

The local security check (LSC) functionality itself is now handled via the /notus endpoint of openvasd. In order to speed up LSCs, the OpenVAS scanner sends the collected packages to openvasd. The transmission is done via HTTP and the openvasd listener is bound to localhost.

Greenbone Management Protocol (GMP)

The Greenbone Management Protocol (GMP) has been updated to version 22.6 and the API has been adjusted slightly. The usage of some commands has changed and several commands, elements and attributes have been deprecated. The complete reference guide and the list of changes are available here.

If gvm-tools and/or python-gvm are to be used with GMP 22.6 and GOS 24.10, the following versions are required:

  • gvm-tools: 25.1.1 or higher
  • python-gvm: 26.0.0 or higher