First published: Tue Aug 29 2023(Updated: )
A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | <10.6.0 |
Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3251 is a pass-back vulnerability in the Nessus application where an authenticated remote attacker with administrator privileges can uncover stored SMTP credentials.
An authenticated remote attacker with administrator privileges can exploit CVE-2023-3251 to uncover stored SMTP credentials within the Nessus application.
The severity of CVE-2023-3251 is medium with a CVSS score of 4.1.
The Nessus application before version 10.6.0 is affected by CVE-2023-3251.
To fix CVE-2023-3251, upgrade your Nessus application to version 10.6.0 or newer.