7.8
CVE-2024-2390
- EPSS 0.07%
- Published 18.03.2024 16:15:09
- Last modified 21.11.2024 09:09:39
- Source vulnreport@tenable.com
- Teams watchlist Login
- Open Login
As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendortenable
≫
Product
nessus_agent
Default Statusunknown
Version <
#202403142053
Version
0
Status
affected
Vendortenable
≫
Product
nessus
Default Statusunknown
Version <
#202403142053
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.219 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
vulnreport@tenable.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.