As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27342 | As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges. |
Fixes
Solution
Tenable has released updates to plugins to resolve the issue. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202403142053.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2024-05 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-21T14:42:09.885Z
Reserved: 2024-03-11T22:31:40.629Z
Link: CVE-2024-2390
Updated: 2024-08-01T19:11:53.526Z
Status : Awaiting Analysis
Published: 2024-03-18T16:15:09.830
Modified: 2024-11-21T09:09:39.010
Link: CVE-2024-2390
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:35Z
EUVD