First published: Tue Aug 29 2023(Updated: )
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus Amazon Machine Image | <10.6.0 |
Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-3252.
The severity of CVE-2023-3252 is medium with a CVSS score of 6.8.
CVE-2023-3252 affects Tenable Nessus version up to 10.6.0.
CVE-2023-3252 can lead to a denial of service condition by allowing an authenticated remote attacker to overwrite arbitrary files on the remote host with log data.
To fix the arbitrary file write vulnerability in CVE-2023-3252, it is recommended to update Tenable Nessus to a version beyond 10.6.0.