First published: Mon Oct 17 2022(Updated: )
Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the “nessusd” process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers’ network of assets.
Credit: disclose@cybersecurityworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28291 is a vulnerability in the Nessus scanner that allows an authenticated user with debug privileges to retrieve stored Nessus policy credentials in cleartext.
All versions of Nessus Essentials and Professional are affected by CVE-2022-28291.
The severity of CVE-2022-28291 is medium, with a severity value of 6.5.
An attacker with debug privileges can exploit CVE-2022-28291 by retrieving stored Nessus policy credentials in cleartext via process dumping.
Yes, Tenable has released a patch to fix CVE-2022-28291. It is recommended to update to the latest version of Nessus Essentials or Professional.