Versioni attuali

Version Lifecycle-Status Patch-Level
OPENVAS SCAN 25.0 New 25.0.3 (2026-04-08)
OPENVAS SCAN 24.10 Mature 24.10.11 (2026-02-19)
OPENVAS REPORT 1.3 New 1.3.0 (2025-12-16)
OpenSight OS 1.0 New 1.0.7 (2026-02-04)

Panoramica

OPENVAS SCAN soluzioni hardware
Versione OPENVAS SCAN Modello Appliance
6500 6400 5400 5300 650 Rev. 1 650 Rev. 2 600 Rev. 1 600 Rev. 2 450 Rev. 1 450 Rev. 2 400 Rev. 1 400 Rev. 2 150 Rev. 1 150 Rev. 2 35
OPENVAS SCAN 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔

OPENVAS SCAN soluzioni virtuali
Versione OPENVAS SCAN Modello Appliance
EXA PETA TERA DECA CENO 25V ONE BASIC FREE
OPENVAS SCAN 24.10 ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔ ✔✔

✔✔ consigliato | ✔ supportato | ✘ non supportato | Assistenza prevista

Calendario release delle versioni OPENVAS SCAN

Rimani sempre un passo avanti con OPENVAS.

Ricevi le innovazioni, i miglioramenti e gli aggiornamenti più importanti di Greenbone direttamente nella tua casella di posta elettronica. Iscriviti alla nostra newsletter sui prodotti e seleziona semplicemente gli argomenti che ti interessano nel modulo.

Changelog

2025-12-19: OPENVAS SCAN 25.0

Current Patch Level: 25.0.3 (2026-04-08)

Lifecycle Status: New

25.0.3 (2026-04-08):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Improvement: the RAM limit of the appliance model OPENVAS FREE was increased from 4 GB to 12 GB (#GOS-2949).
    • Improvement: the number of configurable network routes on the appliance models OPENVAS SCAN VIRTUAL and OPENVAS SCAN MSP has been increased from 8 to 1000 (#GOS-3017).
    • Security fix: the write permissions for the file /usr/sbin/openvas were further restricted to prevent potential privilege escalation attacks (#GOS-2899).
    • Security fix: the Linux kernel was upgraded from version 6.12.73-1 to version 6.12.74-2 for virtual appliances. Hardware appliances are not affected by the vulnerabilities (CVE-2025-71238, CVE-2026-23100, CVE-2026-23221, CVE-2026-23233, CVE-2026-23234, CVE-2026-23235, CVE-2026-23236, CVE-2026-23237, CVE-2026-23238).
    • Bug fix: an error was fixed where the download of the OPENVAS COMMUNITY FEED failed (#GOS-2936).
    • Bug fix: an error was fixed where the switch release to GOS 25.0 could fail, if it was reattempted after a previous failure had been fixed (#GOS-3029).
    • Bug fix: an error was fixed where it was not possible to trigger upgrades on sensors via the GOS menu of the master (#GOS-3056).
    • Bug fix: an error was fixed where the hostkey integrity check failed unexpectedly after a GOS upgrade (#GOS-2954, #GS-9788, #GS-10044).
    • Bug fix: an error was fixed where closing the GOS menu in an unsupported way would cause the GOS menu to crash on the next login (#GOS-2983).
    • Bug fix: an error was fixed where generating a support package could fail if no log messages existed (#GOS-3048, #GS-10044).
    • Minor bug fix: an error was fixed where vulnerability scans erroneously showed that hardware appliances were affected by the “VMScape” vulnerability (#GOS-2948).
    • Minor bug fix: an error was fixed where the logging of the gsad web server could stop (#GOS-3028).
    • Minor bug fix: an error was fixed where the erroneous string “APPLIANCE_NAME” was displayed in the GOS selfcheck (#GOS-2964).
  • Vulnerability management:
    • Improvement: the gvm-tools suite was updated to version 25.4.9 and the python-gvm library was updated to version 26.11.1 (#PR-1834).
    • Minor improvement: the included appliance manual has been updated to the current version from 2026-04-02 (#PR-1819).
    • Minor bug fix: an error was fixed where special characters were not displayed correctly in notifications and dialog titles in the web interface (#GEA-1440).
  • Vulnerability scanning:
    • Bug fix: an issue was fixed where the version comparison of RPM packages could be incorrect (#SC-1572, #GS-9657).

25.0.2 (2026-03-05):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Improvement: it is now possible to define the content included in a support package. The three main options are “complete”, “moderate” (same as “complete” but without passwords”), and “strict” (same as “moderate” but without network information). The default is “strict”. In addition, it is now possible to select which system modules should be taken into account  when generating a support package (#GOS-827).
    • Improvement: the gsad option --http-only is now enabled and the gsad option --secure-cookie disabled when no HTTPS certificate exists. This makes it possible to use the web interface without an HTTPS certificate again. However, the use of an HTTPS certificate is still strongly recommended (#GOS-2880, #GOS-2959).
    • Improvement: FTP airgap master mode was enabled for the appliance model OPENVAS SCAN VIRTUAL (#GOS-2883, #PP-622).
    • Bug fix: an error was fixed where the dialog that is shown after upgrading from GOS 24.10 to GOS 25.0 still pointed to the GOS 24.10 user manual (#GOS-2927).
  • Vulnerability management:
    • Major bug fix: an error was fixed where a change to certain time zones caused gvmd to crash and rendered most vulnerability management components unusable (#GEA-1600, #GEA-1568, #GS-9723).
    • Major bug fix: an error was fixed where the dialog did not show any VTs when editing VT families in scan configurations (#GEA-1553, #GS-9707, #GS-9712, #GS-9753, #GS-9829).
    • Improvement: a button for creating a container image target directly from the container image task dialog has been added (#GEA-1571).
    • Improvement: the gvm-tools suite was updated to version 25.4.7 and the python-gvm library was updated to version 26.10.1 (#PR-1834).
    • Bug fix: an error was fixed where the status of an import task was set to “Interrupted” after reports have been uploaded (#GEA-1521).
    • Bug fix: an error was fixed where the start time set for a schedule was saved with a one-hour deduction (#GEA-1466, #GEA-1567).
    • Bug fix: an error was fixed where host or operating system objects could not be exported (#GEA-1559, #GEA-1564, #GS-9584, #GS-9607).
    • Bug fix: an error was fixed where filters for host objects could were not created as expected (#GEA-1526, #GS-9520, #GS-9729).
    • Minor improvement: the included appliance manual has been updated to the current version from 2026-02-24 (#PR-1761).
  • Vulnerability scanning:
    • Bug fix: an error was fixed where the openvas-scanner logs claimed that the response could not be processed, if a Notus scan did not return any results (#SC-1559).
    • Security fix: several potential issues where the scanner’s NASL processing lacked integer overflow checks were fixed (#SC-1537).

25.0.1 (2026-02-02):

Note: An upgrade to this version requires a reboot of the system.

  • Greenbone OS:
    • Bug fix: an error was fixed where the GOS administration menu crashed when trying to upload a beaming image (#GOS-2720).
    • Bug fix: an error was fixed where no error message in the self-check was displayed when the remote backup server disk was full (#GOS-2651, #GS-9288).
  • Vulnerability management:
    • Improvement: the option to exclude container images from a container image scan was added (#GEA-1515).
    • Improvement: the option to pause and resume container image scans was added (#GEA-1504).
    • Improvement: the target setting Order for target hosts was removed because it had no longer any effect. The order is always random (#GEA-1300, #SC-180).
    • Improvement: the gvm-tools suite was updated to version 25.4.5 and the python-gvm library was updated to version 26.9.1 (#PR-1834).
    • Security fix: a potential path traversal vulnerability when uploading custom report formats has been fixed (#GEA-1475).
    • Bug fix: an error was fixed where the critical results count was missing in the Hosts tab of a report (#GEA-1453).
    • Bug fix: an error was fixed where the error message “Given group_id was invalid” was displayed when trying to save the changes made in the Edit Group dialog (#GEA-1451, #GS-9335, #GS-9403, #GS-9525, #GS-9515).
    • Bug fix: an error was fixed where, instead of the dashboard, an error message was displayed on the Vulnerabilities page (#GEA-1362).
    • Bug fix: an error was fixed where the auto-generation feature for credentials of the type Username + SSH Key did not work (#GEA-1464, #GS-9359).
    • Bug fix: an error was fixed where the auto-generation feature for credentials of the type Username + Password did not work (#GEA-1516).
    • Bug fix: an error was fixed where the Port input box was incorrectly displayed in the dialog for creating or editing a scanner of the type Greenbone Sensor (#GEA-1473).
    • Bug fix: an error was fixed where the file name of a report was not displayed in the dialog when uploading the report to an import task (#GEA-1490, #GEA-1491).
    • Bug fix: an error was fixed where the pagination icons were missing on the Users page (#GEA-1323, #GS-9032, #GS-9195).
    • Bug fix: an error was fixed where the the edit dialog for a regular scan task was opened when trying to edit an import task (#GEA-1401).
    • Bug fix: an error was fixed where there was no default selection of a scanner type when creating a new scanner. The default type is now Greenbone Sensor (#GEA-1399).
    • Bug fix: an error was fixed where the dashboard display Next Scheduled Tasks on the Tasks page did not have any content (#GEA-1478).
    • Bug fix: an error was fixed where it was not possible to create tags for the resource types HostAuditAudit ReportOperating SystemCERT-Bund AdvisoryDFN-CERT Advisory, and Policy (#GEA-1425, #GS-9293).
    • Bug fix: an error was fixed where a loading indicator was permanently displayed instead of an error message when the import of a report format failed (#GEA-1471).
    • Bug fix: an error was fixed where no custom report formats could be imported (#GEA-1470).
    • Bug fix: an error was fixed where already existing certificates were not displayed for credentials of the type Client Certificate when editing the credentials (#GEA-1314).
    • Bug fix: an error was fixed where the installable packages of credentials of the types Username + Password and Username + SSH Key were not usable (#GEA-1495, #GS-9416, #GS-9604).
    • Bug fix: an error was fixed where there was no error message displayed when no Key Distribution Center (KDC) was specified for credentials of the type SMB (Kerberos) (#GEA-1486).
    • Bug fix: an error was fixed where critical results were not included in an exported delta report (#GEA-1492, #GS-9420).
    • Bug fix: an error was fixed where the message “Feed is currently syncing. Please wait while the feed is syncing.” was displayed on the web interface, even if the feed was not actually synchronizing (#GEA-1445, #GS-7870, #GS-8105, #GS-9251, #GS-9332).
    • Bug fix: an error was fixed where the input boxes for including and excluding hosts from a file where not visible when editing a target when a file was uploaded before (#GEA-1449).
    • Bug fix: an error was fixed where reports could not be exported in the report formats Vulnerability Report HTML and Vulnerability Report PDF (#GEA-1592, #GOS-2751).
    • Minor improvement: a new method of counting scanned assets has been introduced to support the new licensing model (#GEA-1438).
    • Minor improvement: the VT family Arch Linux Local Security Checks is no longer editable when creating or editing a scan configuration (#GEA-1375).
    • Minor improvement: the included appliance manual has been updated to the current version from 2026-01-21 (#PR-1688).
    • Minor improvement: tool tips were added for date/time entries in tables on the web interface (#GEA-1459).
    • Minor improvement: it is now possible to receive the private key’s fingerprint of credentials of the type Client Certificate via GMP (#GEA-1409).
    • Minor bug fix: an error was fixed where the error message displayed when editing an import task failed still used the old naming (#GEA-1406, #GEA-1402).
    • Minor bug fix: an error was fixed where the separators between alive tests methods on a target’s details page were missing (#GEA-1397).
    • Minor bug fix: an error was fixed where the old naming “container task” for an import task was still in use (#GEA-1402).
    • Minor bug fix: an spelling error was fixed in the dialog for creating or editing an alert (#GEA-1417).
    • Minor bug fix: an error was fixed where the icons for the wizard and for creating a new task did not have tool tips (#GEA-1411).
    • Minor bug fix: an error was fixed where the link to the audit on the details page of an audit report led to a wrong URL (#GEA-1389).
    • Minor bug fix: an error was fixed where it was not possible to create credentials of the type Username + SSH Key without a passphrase for the SSH key (#GEA-1403).
    • Minor bug fix: an error was fixed where the icons for resetting and removing the filter were missing in the filter bar of the Users page (#GEA-1463).
    • Minor bug fix: an error was fixed where the table functionalities Apply to selected and Apply to all filtered were not working on the Users page (#GEA-1463).
    • Minor bug fix: an error was fixed where gvmd could return an empty XML element (#GEA-1472).
  • Vulnerability scanning:
    • Major bug fix: an error was fixed where a segmentation fault could occur, causing scans to be interrupted, when the Notus scanner was used, but did not return any results (#SC-1529).

25.0.0 (2025-12-19):

Product Portfolio and New License Model

  • The new appliance model OPENVAS SCAN VIRTUAL was added. With its use, a new licensing model will be supported. Licensing will be converted to an asset-based model in the future. This means that the scope of the license will no longer be based on fixed device limits, as was previously the case, but on the number of assets to be analyzed.

Container Image Scanning

  • A new functionality for scanning container images was added for selected appliance models. For this, containers are loaded from one or more container registries defined by the user, the packages used for the container are identified and checked for vulnerabilities, and a report thereof is provided to the user.

Base System

  • With GOS 25.0, the underlying Linux foundation of GOS was updated to the latest version. This includes the addition of post-quantum cryptography (PQC) cryptographic algorithms.