First published: Thu Oct 26 2023(Updated: )
Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
<6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5622 is a vulnerability that allows a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
CVE-2023-5622 has a severity rating of 8.8, which is considered high.
CVE-2023-5622 affects Tenable Nessus Network Monitor versions up to and including 6.3.0 on Windows hosts.
To fix CVE-2023-5622, it is recommended to update Tenable Nessus Network Monitor to a version higher than 6.3.0.
More information about CVE-2023-5622 can be found at the following reference: https://www.tenable.com/security/tns-2023-34