CVE-2023-5847
Tenable Nessus Link Following Local Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.
Bajo ciertas condiciones, un atacante con pocos privilegios podría cargar un archivo especialmente manipulado durante la instalación o actualización para escalar privilegios en hosts de Windows y Linux.
This vulnerability allows local attackers to escalate privileges on affected installations of Tenable Nessus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the configuration of OpenSSL. The process loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-10-30 CVE Reserved
- 2023-11-01 CVE Published
- 2024-07-13 EPSS Updated
- 2024-09-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-269: Improper Privilege Management
CAPEC
- CAPEC-233: Privilege Escalation
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.tenable.com/security/tns-2023-37 | 2023-11-14 | |
https://www.tenable.com/security/tns-2023-38 | 2023-11-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenable Search vendor "Tenable" | Nessus Search vendor "Tenable" for product "Nessus" | < 10.6.2 Search vendor "Tenable" for product "Nessus" and version " < 10.6.2" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Tenable Search vendor "Tenable" | Nessus Search vendor "Tenable" for product "Nessus" | < 10.6.2 Search vendor "Tenable" for product "Nessus" and version " < 10.6.2" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Tenable Search vendor "Tenable" | Nessus Agent Search vendor "Tenable" for product "Nessus Agent" | < 10.4.3 Search vendor "Tenable" for product "Nessus Agent" and version " < 10.4.3" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Tenable Search vendor "Tenable" | Nessus Agent Search vendor "Tenable" for product "Nessus Agent" | < 10.4.3 Search vendor "Tenable" for product "Nessus Agent" and version " < 10.4.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|