A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43927 | A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0. |
Solution
Tenable has released Nessus 10.6.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus ).
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2023-29 |
|
Mon, 30 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-09-30T15:49:08.054Z
Reserved: 2023-06-14T19:51:19.650Z
Link: CVE-2023-3251
Updated: 2024-08-02T06:48:08.181Z
Status : Modified
Published: 2023-08-29T19:15:27.023
Modified: 2024-11-21T08:16:48.053
Link: CVE-2023-3251
No data.
OpenCVE Enrichment
No data.
EUVD