First published: Wed Feb 01 2023(Updated: )
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | ||
Tenable Tenable.Io | ||
Tenable Tenable.sc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0524 is a vulnerability that could allow a malicious actor to escalate privileges by modifying environment variables and abusing an impacted plugin.
Tenable Nessus, Tenable.io, and Tenable Tenable.sc are affected by CVE-2023-0524.
CVE-2023-0524 has a severity rating of 8.8 (high).
A malicious actor with sufficient permissions can modify environment variables and abuse an impacted plugin to escalate privileges.
You can find more information about CVE-2023-0524 at the following reference: [CVE-2023-0524 Reference](https://www.tenable.com/security/tns-2023-04)