Lucene search

K
cve[email protected]CVE-2022-28291
HistoryOct 17, 2022 - 4:15 p.m.

CVE-2022-28291

2022-10-1716:15:20
CWE-522
web.nvd.nist.gov
25
cve-2022-28291
nessus
credentials
network security
vulnerability

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the “nessusd” process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers’ network of assets.

Affected configurations

NVD
Node
tenablenessus
CPENameOperatorVersion
tenable:nessustenable nessuseq*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Nessus Professional ",
    "versions": [
      {
        "version": "Version 10.1.1",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

Related for CVE-2022-28291