A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets.
References
Link | Resource |
---|---|
https://www.tenable.com/security/tns-2023-14 | Vendor Advisory |
https://www.tenable.com/security/tns-2023-14 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-427 |
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/tns-2023-14 - Vendor Advisory |
24 Mar 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:* cpe:2.3:a:tenable:plugin_feed:*:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://www.tenable.com/security/tns-2023-14 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
15 Mar 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-15 23:15
Updated : 2025-02-27 19:15
NVD link : CVE-2022-4313
Mitre link : CVE-2022-4313
CVE.ORG link : CVE-2022-4313
JSON object : View
Products Affected
tenable
- plugin_feed
- nessus
CWE