First published: Fri Feb 23 2024(Updated: )
A DLL injection vulnerability exists where an authenticated, low-privileged local attacker could modify application files on the TIE Secure Relay host, which could allow for overriding of the configuration and running of new Secure Relay services.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable | <3.59.4 |
Tenable has released Tenable Identity Exposure Secure Relay Version 3.59.4 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/identity-exposure https://www.tenable.com/downloads/identity-exposure
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1683 is classified as a medium severity vulnerability due to its potential impact on system configuration and service integrity.
To address CVE-2024-1683, it is recommended to update to Tenable Identity Exposure version 3.59.4 or higher.
CVE-2024-1683 affects users of Tenable Identity Exposure versions prior to 3.59.4.
The risks associated with CVE-2024-1683 include unauthorized modification of application files and potential execution of malicious services.
Yes, CVE-2024-1683 requires an authenticated, low-privileged local attacker to exploit the vulnerability.