Description

A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.







Published: 2023-08-29
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-43927 A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
History

Mon, 30 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2024-09-30T15:49:08.054Z

Reserved: 2023-06-14T19:51:19.650Z

Link: CVE-2023-3251

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.181Z

cve-icon NVD

Status : Modified

Published: 2023-08-29T19:15:27.023

Modified: 2024-11-21T08:16:48.053

Link: CVE-2023-3251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses