The Q-Vul® is a vulnerability testing and reporting network appliance built using OpenVAS (Open Vulnerability Assessment System). OpenVAS, previously called GNessUs, began as a fork from the Nessus® vulnerability scanning tool after Tenable Security removed its Nessus® open source version in 2004. OpenVAS has evolved since then both with respect to its scanning engine, and the vulnerabilities it can find and identify. Currently, it can find and identify more than 47,000 security vulnerabilities in a variety of operating systems, including Windows, IOS, and Linux. The Q-Vul also can identify vulnerabilities in various network appliances, including routers, smart switches, and IoT devices.
Usage is through a Web interface.
The Q-Vul network appliance automatically updates OpenVAS’s Network Vulnerability Tests (NVTs) using the OpenVAS NVT Feed. The OpenVAS NVT Feed is updated at least weekly as fresh vulnerabilities are found. In addition to using the public NVT feed, users can add private NVTs.
The Q-Vul network appliance is intended to be placed on a network and run scans either after the release of new NVTs or upon the introduction of new hardware or software. Scans can be scheduled as frequently as desired. We recommend automated nightly scans in addition to scanning after NVT updates.