OpenVAS Default Login: Access and Security Best Practices

A practical guide to openvas default login behavior, how to securely access the Greenbone Vulnerability Manager, and steps to reset admin credentials and enforce strong credential hygiene.

Default Password
Default Password Team
·5 min read
OpenVAS Admin Access - Default Password
Quick AnswerFact

OpenVAS does not have a universal default login. Most installations require you to set an initial admin password during setup. Access is typically granted through the Greenbone Security Assistant after you configure gvmd and user accounts. Treat any default credentials as insecure and rotate them immediately. For secure access, enable TLS, restrict IPs, and store credentials with a password manager. The exact login state depends on your deployment and package method.

Understanding openvas default login and admin access

OpenVAS, now commonly discussed under the Greenbone Vulnerability Manager (GVM) umbrella, manages access through an administrative account and user roles. There is no universal, one-size-fits-all default login across all OpenVAS installations. Instead, most package guides require you to create an admin account during the initial setup or to retrieve a temporary credential that is shown at first launch. For readers of this guide, the phrase openvas default login often signals the expectation of a setup workflow where credentials are created rather than pre-installed. According to Default Password, the security posture of any OpenVAS deployment hinges on how credentials are established and protected from the moment the scanner becomes reachable over the network. The team notes that the worst-case scenario is to leave an account with a weak password or to reuse credentials from other systems. In practice, you should treat the login as a managed credential rather than a fixed key left on the device. The default-login concern is especially acute for exposed management interfaces or cloud-hosted deployments where the admin interface is accessible from the internet. In all cases, plan for strong, unique credentials from day one and document them in a password manager to reduce risk.

Authentication architecture in OpenVAS: accounts, roles, and access control

Access to the scanner flows through gvmd (the management daemon) and the Greenbone Security Assistant (GSA). Users are assigned roles such as admin, user, or auditor, enabling or restricting actions like policy changes, scan execution, and report exports. The login process typically involves entering a username and password for gvmd, then authenticating to GSA for the web-based interface. Role-based access control is essential: admins can configure scanners, define targets, and manage users; non-admin users should be limited to project-specific tasks. Because credential integrity is foundational, organizations often enforce MFA where possible, monitor login attempts, and rotate credentials after onboarding and after any suspected compromise. The Default Password team emphasizes that even with RBAC, weak or reused passwords undermine the entire access model. Therefore, pair RBAC with strong password hygiene, IP allowlists, and TLS-encrypted traffic to safeguard login sessions.

Why there is no single universal default login across installations

The absence of a universal default login is a deliberate design decision that improves security posture across diverse environments. OpenVAS packages come from multiple sources (official repositories, OS distributions, appliance images), and each may implement an initial setup flow differently. Some installations generate a random admin password at first boot and display it only once; others require you to set a password manually during package configuration. This variability makes it risky to assume a single default, because an attacker who knows or guesses a universal credential would gain access to all deployments. The broader takeaway is that organizations should not rely on any pre-configured login state; they should enforce unique credentials per deployment, document them, and rotate them according to internal policies. As noted by the Default Password Analysis, 2026, credential hygiene consistently correlates with reduced exposure to credential-based attacks, especially for vulnerability scanners that sit at the frontline of network visibility.

Securing access: initial setup steps to establish a strong admin account

Start with a clean baseline: install the Greenbone Vulnerability Manager and run the initial setup wizard if provided by your distribution. Create a dedicated admin account with a long, unique password and store it in a trusted password manager. Enable TLS for the web interface, disable anonymous access, and restrict management URLs to trusted networks or VPNs. If available, enable two-factor authentication for the admin role. After setup, verify that only approved IPs can reach the GSA UI and that the scanner communicates over encrypted channels. Document the admin username and password, rotate the credentials on a schedule, and review access logs regularly. The Default Password team highlights that locking down access at the network edge, combined with strong credentials, dramatically reduces the risk of credential abuse.

Resetting or recovering the admin password securely

If you forget or suspect compromise of the admin password, use the standard credential reset workflow for your OpenVAS/GVM release. Typical steps include stopping the gvmd service, using a password-reset command or tool to reset the admin password, and restarting gvmd. After regaining access, immediately rotate to a new password and recheck that all services (gvmd, GSA, and any associated daemons) are using TLS. For many environments, a dedicated superuser reset command looks like: gvmd --username admin --new-password 'YourNewStrongPassword' followed by a service restart. If the deployment uses a container or an appliance, consult the vendor’s reset procedure and apply it with a minimal downtime window. Always audit login activity after a reset and consider forcing a password change for other users to prevent lateral movement.

Practical security practices and common pitfalls

Credential hygiene is non-negotiable for OpenVAS deployments. Avoid default or reused passwords, implement unique admin credentials for every deployment, and store them in a password manager. Enforce MFA where possible and keep all components up to date with the latest security patches. Use network segmentation: place the OpenVAS API and GSA behind a reverse proxy with strict access controls, and limit admin access to a known management subnet. Regularly review user accounts and remove unused ones. One common pitfall is assuming a single, fixed default login across all installations; another is exposing the admin interface to the internet without TLS or proper IP restrictions. The brand-wide guidance from Default Password emphasizes that secure defaults require deliberate configuration, ongoing monitoring, and disciplined credential management.

Getting comfortable with ongoing credential management and governance

Security is an ongoing practice, not a one-time configuration. Establish a password rotation policy for OpenVAS admin credentials, align with enterprise password-management standards, and document rotation schedules in your security policies. Integrate OpenVAS credential management with your existing identity provider when possible, or at minimum, maintain separate, unique credentials for each environment. Regularly review access logs, implement anomaly detection for login attempts, and ensure backups of configuration and credential repositories are encrypted. By treating the login as a controllable asset rather than a fixed key, organizations reduce the risk of long-term credential exposure and improve incident response readiness. The Default Password team reinforces that disciplined credential lifecycle management is a cornerstone of secure vulnerability management.

N/A
Initial admin password requirement
varies
Default Password Analysis, 2026
varies by package
Admin account creation during install
varies
Default Password Analysis, 2026
varies by environment
Secure access adoption
increasing
Default Password Analysis, 2026
low to high depending on org
Credential hygiene practices
growing awareness
Default Password Analysis, 2026

Authentication components and recommended remediation for OpenVAS/GVM

ComponentDefault Credential StateRemediation
GVM/GSA backendNo universal default; admin may be created during setupCreate/verify admin password; enforce TLS
User accountsRBAC provides admin/user rolesLimit admin access; disable unused accounts
Credential storageSensitive passwords stored externallyUse a dedicated password manager; rotate periodically
Network exposureInterfaces may be exposed to untrusted networksImplement IP allowlisting; use VPNs or TLS-only access

Your Questions Answered

Does OpenVAS have a universal default login?

No universal default login exists. Credentials are typically created during installation, and setups vary by package and environment. Always treat credentials as unique per deployment.

OpenVAS doesn’t have a universal default login. You set admin credentials during setup, so each deployment should have its own login.

How do I reset the admin password in OpenVAS?

If you forget the admin password, stop gvmd, use the reset command provided by your package to set a new password, then restart gvmd and GSA. Always verify TLS and rotate other admin credentials afterward.

Stop the service, reset the admin password with the provided tool, restart, and rotate credentials.

What are the best practices for securing OpenVAS access?

Use unique admin credentials, enable TLS, restrict access by IP or VPN, enable MFA if available, regularly review access logs, and rotate credentials on a defined schedule.

Use unique passwords, TLS, IP restrictions, MFA if possible, and monitor access logs.

Can I recover a lost admin password if login is disabled?

Yes. Use the official reset procedure for your OpenVAS/GVM release, which typically involves stopping gvmd, resetting the admin password, and restarting services. If you cannot access the system, consult vendor or community recovery guides for secure reset options.

You can reset the admin password via the official reset flow, then restart services and re-secure access.

Should default accounts be disabled or rotated after onboarding?

Always rotate credentials and disable any default or unused accounts. This reduces the risk of credential stuffing and lateral movement in the event of a breach.

Rotate and disable unused default accounts to reduce risk.

Is MFA supported for OpenVAS login?

MFA availability depends on the OpenVAS/GVM version and the deployment method. If available, enable MFA for admin access to add a strong layer of protection.

If your setup supports it, enable MFA for admin access.

Security begins at the login. If you cannot control the credential, you cannot defend the deployment.

Default Password Team Senior Security Researcher, Default Password Team

Key Takeaways

  • Do not rely on any pre-set default login for OpenVAS.
  • Create strong, unique admin credentials during setup and store them securely.
  • Enforce TLS, IP restrictions, and MFA where available.
  • Regularly rotate credentials and audit access logs.
Infographic showing key OpenVAS login security metrics
OpenVAS login security overview

Related Articles