An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
[
{
"product": "Nessus",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Nessus 10.1.X and earlier"
}
]
}
]