First published: Tue Aug 29 2023(Updated: )
An improper authorization vulnerability exists where an authenticated, low privileged remote attacker could view a list of all the users available in the application.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | <10.6.0 |
Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-3253.
CVE-2023-3253 has a severity rating of 4.3, which is considered medium.
The affected software for CVE-2023-3253 is Tenable Nessus up to version 10.6.0.
The impact of CVE-2023-3253 is that an authenticated low privileged remote attacker could view a list of all the users available in the application.
To fix CVE-2023-3253, it is recommended to apply the necessary patches or updates provided by the software vendor.