CVE Scanner not showing any CVEs for any host

I’ve downloaded the latest version of the Greenbone Enterprise TRIAL Image for VMWare. I haven’t received the trial license key yet, so I believe I am currently using the community feed (as per the documentation instructions).

I am able to run it successful on VMWare. In the feed status, ‘SCAP’, ‘CERT’, and ‘GVMD_DATA’ are showing as ‘6 days old’, while ‘NVT’ is showing as ‘current’.

I’ve tried scanning with three different IP addresses, but CVEs were not discovered for any of them. I used the default configuration for setting up the task, selecting only the ‘CVE Scanner’ option under ‘scanner’; all other settings remained at their defaults.

When I initiate a scan, it completes within 20 to 30 seconds and shows a ‘DONE’ status, but doesn’t discovers any CVEs. However, when I switch to the ‘OpenVAS default scanner’ option under ‘scanner’, the scan takes about an hour and discovers a few open ports and SSL-related vulnerabilities.

If i am missing something or doing anything wrong, please let me know.

I have also attached screenshots of the target and task configurations for reference.

Thank you.



Hi Fire,

In addition to successfully installing and logging into Greenbone, the next step would be to read the manual in order to understand the various configuration options for scanning - and many additional features offered by Greenbone.

The CVE Scanner option is not for scanning a host. Rather it will check for newly published CVEs that have been issued for any applications discovered during your previous scans. For the the most complete results you would want to conduct authenticated scans which will scan within the target as a logged in user as well as any network accessible services.

It would be best to familiarize yourself with the all the options by reading the manual.

Furthermore, another benefit of Greenbone is the feature to continuously schedule scans including scans with the CVE Scanner configuration as opposed to simply doing a “point-in-time” scan and using a “set it and forget it” approach to cybersecurity. I guess you have some open services exposed on the target and internal software installed as well. Even if this “SBOM” is free from vulnerabilities today, new vulnerabilities could be found in the future. Greenbone also includes various alert options.

2 Likes

Hi rippledj,

Thank you for your response. I should have reviewed the documentation earlier. I’ve looked through it, but I’m still encountering an issue.

Even when I select the Openvas default scanner, it detects a few open ports and SSL-related vulnerabilities, but no CVEs are being discovered or displayed in the CVE tab for any of the 4 Public IPs that i have tested.

So, if there is any solution, please let me know.

Thank you.

The relevant documentation for the CVE scanner including prerequisites is available here:

https://docs.greenbone.net/GSM-Manual/gos-22.04/en/scanning.html#configuring-a-cve-scan

If for example no known products have been identified at the target host and no relevant CPEs are registered due to this (e.g. the software / product running on the target is only supported within the enterprise feed, there is just no coverage for the products in question in general, …) it is expected that the CVE scanner doesn’t return any results.

Unfortunately no one can give more specific guidance / support for such topics remotely, usually you would need to figure this out on your own :confused: like e.g.:

  1. Is/are the product(s) on the target host even supported?
  2. Is the scanning environment working (e.g. is the feed correctly loaded, are supported versions in use, …)
  3. More from e.g. 20.3 Why Is a Service/Product Not Detected?
2 Likes