Lucene search

K
nvd[email protected]NVD:CVE-2023-5624
HistoryOct 26, 2023 - 5:15 p.m.

CVE-2023-5624

2023-10-2617:15:09
CWE-20
web.nvd.nist.gov
6
nessus network monitor
input validation
vulnerability
admin user
blindsql injection

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

24.9%

Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.

Affected configurations

Nvd
Node
tenablenessus_network_monitorRange<6.3.0
VendorProductVersionCPE
tenablenessus_network_monitor*cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

24.9%