Vulnerability Details : CVE-2023-6062
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2023-6062
- cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6062
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6062
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
1.2
|
5.2
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
2.3
|
4.0
|
Tenable Network Security, Inc. |
CWE ids for CVE-2023-6062
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-6062
-
https://www.tenable.com/security/tns-2023-39
[R1] Nessus Version 10.5.7 Fixes One Vulnerability - Security Advisory | TenableĀ®Vendor Advisory
-
https://www.tenable.com/security/tns-2023-40
[R1] Nessus Version 10.6.3 Fixes One Vulnerability - Security Advisory | TenableĀ®Vendor Advisory
Jump to