First published: Sat Feb 06 2021(Updated: )
Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus Amazon Machine Image | <=8.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5812 is rated as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2020-5812, upgrade to Nessus AMI version 8.12.1 or later.
CVE-2020-5812 allows attackers to perform man-in-the-middle attacks by spoofing trusted entities.
Nessus AMI versions 8.12.0 and earlier are affected by CVE-2020-5812.
Yes, CVE-2020-5812 can be exploited easily if the affected Nessus AMI is deployed without the necessary patches.