Plattform
windows
Komponente
nessus
Behoben in
10.6.2
10.4.3
CVE-2023-5847 describes a privilege escalation vulnerability in Nessus. An attacker can exploit this flaw by loading a specially crafted file during the installation or upgrade process, potentially gaining elevated privileges on both Windows and Linux hosts. This vulnerability affects Nessus versions from 0.0 up to and including 10.6.2. A fix is available in version 10.6.2.
Successful exploitation of CVE-2023-5847 allows a low-privileged attacker to gain higher-level access to the affected system. This could involve gaining system administrator privileges, enabling the attacker to install malware, modify system configurations, steal sensitive data, or disrupt operations. The ability to exploit this during installation or upgrade is particularly concerning, as it could be leveraged to compromise systems before standard security measures are fully in place. The impact is amplified in environments where Nessus is used for vulnerability scanning, as a compromised scanner could provide attackers with valuable information about the network and its defenses.
The vulnerability is publicly known and documented in the NVD. As of the current date, there are no reports of active exploitation campaigns targeting CVE-2023-5847. The EPSS score is likely low to medium, reflecting the need for specific crafted files and the potential complexity of the exploitation process. No KEV listing is currently available.
Organizations heavily reliant on Nessus for vulnerability scanning are particularly at risk. Environments with automated or unattended Nessus installations and upgrades are also more vulnerable, as they may not have immediate visibility into the exploitation attempt. Shared hosting environments where multiple users share the same Nessus instance could also be affected.
• windows / supply-chain:
Get-Process -Name Nessus | Select-Object -ExpandProperty Path• windows / supply-chain:
Get-ScheduledTask | Where-Object {$_.TaskName -like '*Nessus*'}• windows / supply-chain:
Get-WinEvent -LogName Application -FilterXPath '//Event[System[Provider[@Name='NessusService']] and (EventData[Data[@Name='EventCode']='1000'])]'disclosure
Exploit-Status
EPSS
0.05% (16% Perzentil)
CVSS-Vektor
The primary mitigation for CVE-2023-5847 is to upgrade Nessus to version 10.6.2 or later. Prior to upgrading, it's crucial to back up your Nessus configuration and data to facilitate a rollback if the upgrade process encounters issues. While a direct workaround isn't available, ensure that file uploads during installation and upgrades are carefully scrutinized and validated to prevent malicious file execution. Consider implementing stricter file access controls and integrity checks on the Nessus installation directory to limit the potential impact of a successful exploit. After upgrading, confirm the fix by attempting a clean installation or upgrade and verifying that the crafted file loading exploit is no longer successful.
Actualice Nessus a la última versión disponible. Esto solucionará la vulnerabilidad de escalada de privilegios al evitar la carga de archivos manipulados durante la instalación o actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2023-5847 is a medium severity vulnerability in Nessus allowing a low-privileged attacker to escalate privileges by loading a crafted file during installation or upgrade.
You are affected if you are running Nessus versions 0.0 through 10.6.2. Upgrade to 10.6.2 or later to mitigate the risk.
Upgrade Nessus to version 10.6.2 or later. Back up your configuration before upgrading to allow for rollback if needed.
As of now, there are no confirmed reports of active exploitation campaigns targeting CVE-2023-5847.
Refer to the official Tenable security advisory for detailed information and updates: https://www.tenable.com/security/advisories/nessus-privilege-escalation
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.