Description
Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57915 | Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2023-34 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-02T08:07:32.319Z
Reserved: 2023-10-17T19:03:14.686Z
Link: CVE-2023-5622
Updated: 2024-08-02T08:07:32.319Z
Status : Modified
Published: 2023-10-26T17:15:09.773
Modified: 2024-11-21T08:42:08.223
Link: CVE-2023-5622
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD