First published: Tue Feb 06 2024(Updated: )
A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
<10.7.0 |
Tenable has released Nessus 10.7.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0971 is classified as a SQL injection vulnerability which can potentially lead to unauthorized data manipulation.
To remediate CVE-2024-0971, it is recommended to upgrade Tenable Nessus to version 10.7.0 or later.
CVE-2024-0971 affects authenticated users of Tenable Nessus versions below 10.7.0.
CVE-2024-0971 facilitates SQL injection attacks allowing low-privileged authenticated attackers to alter scan database content.
Currently, there are no known workarounds for CVE-2024-0971 other than applying the recommended software update.