First published: Tue Jun 18 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Tenable Nessus Network Monitor. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-5622.
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-21959 is classified as critical due to the potential for local privilege escalation.
To fix ZDI-CAN-21959, update to the latest version of Tenable Nessus Network Monitor as provided by the vendor.
Any users of Tenable Nessus Network Monitor with installations that allow for local code execution are affected by ZDI-CAN-21959.
ZDI-CAN-21959 facilitates local privilege escalation attacks on vulnerable installations of Tenable Nessus Network Monitor.
An attacker must gain the ability to execute low-privileged code on the target system to exploit ZDI-CAN-21959.