As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-27342 As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
Fixes

Solution

Tenable has released updates to plugins to resolve the issue. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202403142053.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2024-08-21T14:42:09.885Z

Reserved: 2024-03-11T22:31:40.629Z

Link: CVE-2024-2390

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.526Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-18T16:15:09.830

Modified: 2024-11-21T09:09:39.010

Link: CVE-2024-2390

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:42:35Z