![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.108560 |
Category: | General |
Title: | Report outdated / end-of-life Scan Engine / Environment (local) |
Summary: | This script checks and reports an outdated or end-of-life scan; engine for the following environments:;; - Greenbone Community Edition;; - Greenbone Free (formerly Greenbone Enterprise TRIAL, Greenbone Security Manager TRIAL /; Greenbone Community Edition VM);; used for this scan.;; NOTE: While this is not, in and of itself, a security vulnerability, a severity is reported to; make you aware of a possible decreased scan coverage or missing detection of vulnerabilities on; the target due to e.g.:;; - missing functionalities;; - missing bugfixes;; - incompatibilities within the feed |
Description: | Summary: This script checks and reports an outdated or end-of-life scan engine for the following environments: - Greenbone Community Edition - Greenbone Free (formerly Greenbone Enterprise TRIAL, Greenbone Security Manager TRIAL / Greenbone Community Edition VM) used for this scan. NOTE: While this is not, in and of itself, a security vulnerability, a severity is reported to make you aware of a possible decreased scan coverage or missing detection of vulnerabilities on the target due to e.g.: - missing functionalities - missing bugfixes - incompatibilities within the feed Solution: Update to the latest available stable release for your scan environment. Note: It is NOT enough to only update the scanner component. All components should be updated to the most recent and stable versions. Possible solution options depends on the installation method: - If using the Greenbone Free: Please do a new installation with the newest available version - If using the official Greenbone Community Containers: Please see the references on how to do an update of these - If the Greenbone Community Edition was build from sources by following the official source build documentation: Please see the references on how to do an update of all components - If using packages provided by your Linux distribution: Please contact the maintainer of the used distribution / repository and request updated packages - If using any other installation method: Please contact the provider of this solution Please check the references for more information. If you want to accept the risk of a possible decreased scan coverage or missing detection of vulnerabilities on the target you can set a global override for this script as described in the linked GSM manual. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Copyright | Copyright (C) 2019 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |