Versioni attuali

Version Lifecycle-Status Patch-Level
OPENVAS SCAN 25.0 New 25.0.1 (2026-02-02)
OPENVAS SCAN 24.10 Mature 24.10.11 (2026-02-19)
OPENVAS SCAN 22.04 End-of-Life 22.04.29 (2025-07-07)
OPENVAS REPORT 1.3 New 1.3.0 (2025-12-16)
OPENVAS OS 1.0 New 1.0.7 (2026-02-04)

Panoramica

OPENVAS SCAN soluzioni hardware
Versione OPENVAS SCAN Modello Appliance
6500 6400 5400 5300 650 Rev. 1 650 Rev. 2 600 Rev. 1 600 Rev. 2 450 Rev. 1 450 Rev. 2 400 Rev. 1 400 Rev. 2 150 Rev. 1 150 Rev. 2 35
OPENVAS SCAN 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔
OPENVAS SCAN 22.04 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔

OPENVAS SCAN soluzioni virtuali
Versione OPENVAS SCAN Modello Appliance
EXA PETA TERA DECA CENO 25V ONE BASIC FREE
OPENVAS SCAN 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔
OPENVAS SCAN 22.04 ✔✔

✔✔ consigliato | ✔ supportato | ✘ non supportato | Assistenza prevista

Calendario release delle versioni OPENVAS SCAN

Rimani sempre un passo avanti con OPENVAS.

Ricevi le innovazioni, i miglioramenti e gli aggiornamenti più importanti di Greenbone direttamente nella tua casella di posta elettronica. Iscriviti alla nostra newsletter sui prodotti e seleziona semplicemente gli argomenti che ti interessano nel modulo.

Changelog

2025-12-19: OPENVAS SCAN 25.0

Current Patch Level: 25.0.1 (2026-02-02)

Lifecycle Status: New

25.0.1 (2026-02-02):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Bug fix: an error was fixed where the GOS administration menu crashed when trying to upload a beaming image (#GOS-2720).
    • Bug fix: an error was fixed where no error message in the self-check was displayed when the remote backup server disk was full (#GOS-2651, #GS-9288).
  • Vulnerability management:
    • Improvement: the target setting Order for target hosts was removed because it had no longer any effect. The order is always random (#GEA-1300, #SC-180).
    • Bug fix: an error was fixed where the critical results count was missing in the Hosts tab of a report (#GEA-1453).
    • Bug fix: an error was fixed where the error message “Given group_id was invalid” was displayed when trying to save the changes made in the Edit Group dialog (#GEA-1451, #GS-9335, #GS-9403, #GS-9525, #GS-9515).
    • Bug fix: an error was fixed where, instead of the dashboard, an error message was displayed on the Vulnerabilities page (#GEA-1362).
    • Bug fix: an error was fixed where the auto-generation feature for credentials of the type Username + SSH Key did not work (#GEA-1464, #GS-9359).
    • Bug fix: an error was fixed where the auto-generation feature for credentials of the type Username + Password did not work (#GEA-1516).
    • Bug fix: an error was fixed where the Port input box was incorrectly displayed in the dialog for creating or editing a scanner of the type Greenbone Sensor (#GEA-1473).
    • Bug fix: an error was fixed where the file name of a report was not displayed in the dialog when uploading the report to an import task (#GEA-1490, #GEA-1491).
    • Bug fix: an error was fixed where the pagination icons were missing on the Users page (#GEA-1323, #GS-9032, #GS-9195).
    • Bug fix: an error was fixed where the the edit dialog for a regular scan task was opened when trying to edit an import task (#GEA-1401).
    • Bug fix: an error was fixed where there was no default selection of a scanner type when creating a new scanner. The default type is now Greenbone Sensor (#GEA-1399).
    • Bug fix: an error was fixed where the dashboard display Next Scheduled Tasks on the Tasks page did not have any content (#GEA-1478).
    • Bug fix: an error was fixed where it was not possible to create tags for the resource types HostAuditAudit ReportOperating SystemCERT-Bund AdvisoryDFN-CERT Advisory, and Policy (#GEA-1425, #GS-9293).
    • Bug fix: an error was fixed where a loading indicator was permanently displayed instead of an error message when the import of a report format failed (#GEA-1471).
    • Bug fix: an error was fixed where no custom report formats could be imported (#GEA-1470).
    • Bug fix: an error was fixed where already existing certificates were not displayed for credentials of the type Client Certificate when editing the credentials (#GEA-1314).
    • Bug fix: an error was fixed where the installable packages of credentials of the types Username + Password and Username + SSH Key were not usable (#GEA-1495, #GS-9416, #GS-9604).
    • Bug fix: an error was fixed where there was no error message displayed when no Key Distribution Center (KDC) was specified for credentials of the type SMB (Kerberos) (#GEA-1486).
    • Bug fix: an error was fixed where critical results were not included in an exported delta report (#GEA-1492, #GS-9420).
    • Bug fix: an error was fixed where the message “Feed is currently syncing. Please wait while the feed is syncing.” was displayed on the web interface, even if the feed was not actually synchronizing (#GEA-1445, #GS-7870, #GS-8105, #GS-9251, #GS-9332).
    • Bug fix: an error was fixed where the input boxes for including and excluding hosts from a file where not visible when editing a target when a file was uploaded before (#GEA-1449).
    • Bug fix: an error was fixed where reports could not be exported in the report formats Vulnerability Report HTML and Vulnerability Report PDF (#GEA-1592, #GOS-2751).
    • Minor improvement: the VT family Arch Linux Local Security Checks is no longer editable when creating or editing a scan configuration (#GEA-1375).
    • Minor improvement: the included appliance manual has been updated to the current version from 2026-01-21 (#PR-1688).
    • Minor improvement: tool tips were added for date/time entries in tables on the web interface (#GEA-1459).
    • Minor improvement: it is now possible to receive the private key’s fingerprint of credentials of the type Client Certificate via GMP (#GEA-1409).
    • Minor bug fix: an error was fixed where the error message displayed when editing an import task failed still used the old naming (#GEA-1406, #GEA-1402).
    • Minor bug fix: an error was fixed where the separators between alive tests methods on a target’s details page were missing (#GEA-1397).
    • Minor bug fix: an error was fixed where the old naming “container task” for an import task was still in use (#GEA-1402).
    • Minor bug fix: an spelling error was fixed in the dialog for creating or editing an alert (#GEA-1417).
    • Minor bug fix: an error was fixed where the icons for the wizard and for creating a new task did not have tool tips (#GEA-1411).
    • Minor bug fix: an error was fixed where the link to the audit on the details page of an audit report led to a wrong URL (#GEA-1389).
    • Minor bug fix: an error was fixed where it was not possible to create credentials of the type Username + SSH Key without a passphrase for the SSH key (#GEA-1403).
    • Minor bug fix: an error was fixed where the icons for resetting and removing the filter were missing in the filter bar of the Users page (#GEA-1463).
    • Minor bug fix: an error was fixed where the table functionalities Apply to selected and Apply to all filtered were not working on the Users page (#GEA-1463).
    • Minor bug fix: an error was fixed where gvmd could return an empty XML element (#GEA-1472).
  • Vulnerability scanning:
    • Major bug fix: an error was fixed where a segmentation fault could occur, causing scans to be interrupted, when the Notus scanner was used, but did not return any results (#SC-1529).

25.0.0 (2025-12-19):

Product Portfolio and New License Model

  • The new appliance model OPENVAS SCAN VIRTUAL was added. With its use, a new licensing model will be supported. Licensing will be converted to an asset-based model in the future. This means that the scope of the license will no longer be based on fixed device limits, as was previously the case, but on the number of assets to be analyzed.

Container Image Scanning

  • A new functionality for scanning container images was added for selected appliance models. For this, containers are loaded from one or more container registries defined by the user, the packages used for the container are identified and checked for vulnerabilities, and a report thereof is provided to the user.

Base System

  • With GOS 25.0, the underlying Linux foundation of GOS was updated to the latest version. This includes the addition of post-quantum cryptography (PQC) cryptographic algorithms.