First published: Mon Sep 30 2024(Updated: )
A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus Network Monitor | <6.5.0 |
Tenable has released Nessus Network Monitor 6.5.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-network-monitor https://www.tenable.com/downloads/nessus-network-monitor ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9158 is classified as a medium-severity vulnerability that allows for stored cross-site scripting.
To remediate CVE-2024-9158, upgrade to the latest version of Tenable Nessus Network Monitor that addresses this vulnerability.
CVE-2024-9158 affects authenticated users of Tenable Nessus Network Monitor versions prior to 6.5.0.
CVE-2024-9158 enables a local privileged authenticated attacker to inject arbitrary code through the Nessus Network Monitor UI.
CVE-2024-9158 was disclosed in 2024 as a security vulnerability in Tenable Nessus Network Monitor.