CPE, HOST-T and IT-Grundshultz show up on the Vulnerability Scan Detail report as open ports, but they are not a specific port, but rather log information that a particular set of ports were scanned using those extension modules.
Just like CVE and NVT, the above modules represent other tests as defined by their respective organizations. They will show up in the port lists to indicate the tests were performed, but should be taken as informational data only.
More information can be found about CPE at http://cpe.mitre.org
Information on the IT-Grundshultz can be found at https://www.bsi.bund.de
What are CPE, HOST-T and IT-Grundshultz ports on the Vulnerability Scan Detail report?
Have more questions?
Was this article helpful?
Provide feedback for the Documentation team!
Browse this section
- Scan Range for External Vulnerability Scan
- External Vulnerability Scan Preparation and Explanation
- Data Breach Liability - What does the PII scan look for?
- What is the purpose of the Outbound Vulnerability Report?
- How often are external vulnerability scan definitions updated?
- Does the website section of the security report mean someone is visiting those sites?
- Why are we limited to 50 IP addresses when scheduling an External Vulnerability scan?
- What are CPE, HOST-T and IT-Grundshultz ports on the Vulnerability Scan Detail report?
- The Outbound Security Reports says that certain protocols are not filtered. Does that mean someone is connecting to that?
- Outbound Security Report - User Controls explained
- See more