Complete end-of-life dates, support windows, and security status for all Opnsense versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.
| Version | Latest Release | Release Date | EOL Date | Days | Status |
|---|---|---|---|---|---|
| 15.1 | 15.1.12 | Jan 2, 2015 | Jul 2, 2015 | 3964 days past EOL | EOL |
| 15.7 | 15.7.25 | Jul 2, 2015 | Jan 28, 2016 | 3754 days past EOL | EOL |
| 16.1 | 16.1.20 | Jan 28, 2016 | Jul 26, 2016 | 3574 days past EOL | EOL |
| 16.7 | 16.7.14 | Jul 26, 2016 | Jan 27, 2017 | 3389 days past EOL | EOL |
| 17.1 | 17.1.11 | Jan 27, 2017 | Jul 26, 2017 | 3209 days past EOL | EOL |
| 17.7 | 17.7.12 | Jul 26, 2017 | Jan 26, 2018 | 3025 days past EOL | EOL |
| 18.1 | 18.1.13 | Jan 26, 2018 | Jul 29, 2018 | 2841 days past EOL | EOL |
| 18.7 | 18.7.10 | Jul 29, 2018 | Jan 28, 2019 | 2658 days past EOL | EOL |
| 19.1 | 19.1.10 | Jan 28, 2019 | Jul 15, 2019 | 2490 days past EOL | EOL |
| 19.7 | 19.7.10 | Jul 15, 2019 | Jan 29, 2020 | 2292 days past EOL | EOL |
| 20.1 | 20.1.9 | Jan 29, 2020 | Jul 28, 2020 | 2111 days past EOL | EOL |
| 20.7 | 20.7.8 | Jul 28, 2020 | Jan 26, 2021 | 1929 days past EOL | EOL |
| 21.1 | 21.1.9 | Jan 26, 2021 | Jul 23, 2021 | 1751 days past EOL | EOL |
| 21.7 | 21.7.8 | Jul 23, 2021 | Jan 25, 2022 | 1565 days past EOL | EOL |
| 22.1 | 22.1.10 | Jan 25, 2022 | Jul 25, 2022 | 1384 days past EOL | EOL |
| 22.7 | 22.7.11 | Jul 25, 2022 | Jan 25, 2023 | 1200 days past EOL | EOL |
| 23.1 | 23.1.11 | Jan 25, 2023 | Jul 28, 2023 | 1016 days past EOL | EOL |
| 23.7 | 23.7.12 | Jul 28, 2023 | Jan 26, 2024 | 834 days past EOL | EOL |
| 24.1 | 24.1.10 | Jan 26, 2024 | Jul 25, 2024 | 653 days past EOL | EOL |
| 24.7 | 24.7.12 | Jul 23, 2024 | Jan 28, 2025 | 466 days past EOL | EOL |
| 25.1 | 25.1.12 | Jan 28, 2025 | Jul 23, 2025 | 290 days past EOL | EOL |
| 25.7 | 25.7.11 | Jul 22, 2025 | Jan 28, 2026 | 101 days past EOL | EOL |
| 26.1 | 26.1.7 | Jan 28, 2026 | Already EOL | Supported | Active |
When a Opnsense version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.
The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.
Organizations running EOL Opnsense should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.
Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.
Open Stack Scanner →