Vulnerability identifier: #VU83307
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6062
CWE-ID:
CWE-434
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Tenable Nessus
Client/Desktop applications /
Software for system administration
Vendor: Tenable Network Security
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of file during file upload. A remote user with administrative privileges can alter Nessus Rules variables and overwrite arbitrary files on the remote host, leading to denial of service.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Tenable Nessus: 10.5.0 - 10.6.2
External links
https://www.tenable.com/security/tns-2023-39
https://www.tenable.com/security/tns-2023-40
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.