Vulnerability Details : CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x before 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Products affected by CVE-2017-11506
- cpe:2.3:a:tenable:nessus:6.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.9:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:6.3.2:*:*:*:*:*:*:*
Threat overview for CVE-2017-11506
Top countries where our scanners detected CVE-2017-11506
Top open port discovered on systems with this issue
8834
IPs affected by CVE-2017-11506 137
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-11506!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-11506
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11506
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2017-11506
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11506
-
http://www.securitytracker.com/id/1039141
Tenable Nessus TLS Certificate Validation Flaw Lets Certain Remote Users Access and Modify Data Communicated Between a Scanner and a Manager - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.tenable.com/security/tns-2017-11
[R1] Nessus 6.11 Fixes One Vulnerability - Security Advisory | TenableĀ®Vendor Advisory
Jump to