Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Cloudflare Open-Sources Network Vulnerability Scanner

Security and web performance services provider Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner.

Security and web performance services provider Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner.

Based on the Nmap open source tool, Flan Scan was born out of the need for an easy-to-deploy scanner that could accurately detect the services on a network and then look them up in a database of CVEs to find any relevant vulnerabilities.

Cloudflare chose Nmap as the base scanner due to its focus on reducing false positives and because the Nmap Scripting Engine (NSE) allows scripts to be run against the scan results. Moreover, the “vulners” script on NSE would already map detected services to relevant CVEs from a database.


To convert Nmap to Flan Scan, Cloudflare added three features: Easy Deployment and Configuration — Flan Scan runs inside a Docker container and also includes sample Kubernetes configuration and deployment files — support for pushing results to a Google Cloud Storage Bucket or an S3 bucket, and Actionable Reports generated from Nmap’s output.

The protection services provider claims that Flan Scan has already helped it complete compliance scans and improve the security of its network through discovering the use of an outdated, vulnerable version of Apache, and a vulnerable instance of PostgreSQL.

“Flan Scan is part of a larger effort to expand our vulnerability management program. We recently deployed osquery to our entire network to perform host-based vulnerability tracking. By complementing osquery’s findings with Flan Scan’s network scans we are working towards comprehensive visibility of the services running at our edge and their vulnerabilities,” Cloudflare says.

Flan Scan first runs an Nmap scan with service detection: ICMP ping scan (IP addresses that are online), SYN scan (the 1,000 most common ports of the responding IP addresses), and service detection scan (for services running on open ports Nmap performs TCP handshake and banner grabbing scans).

Users can also conduct UDP and IPv6 scanning, and they can use any other extended feature of Nmap.

The “vulners” script tag is also present in Flan Scan’s default Nmap command, to output a list of vulnerabilities applicable to the services detected — it makes API calls to a service run by for that.

Using LaTeX, Flan Scan next converts Nmap’s output to actionable reports. The results are structured around services: vulnerable services are enumerated, each with a list of relevant vulnerabilities and the IP addresses running the service.

“Cloudflare’s mission is to help build a better Internet for everyone, not just Internet giants who can afford to buy expensive tools. We’re open sourcing Flan Scan because we believe it shouldn’t cost tons of money to have strong network security,” the security firm concludes.

Related: Free Cloudflare Tool Helps CAs Securely Issue Certificates

Related: Cloudflare Raises $150 Million

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.