An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Affected Software
Name |
Vendor |
Start Version |
End Version |
Nessus |
Tenable |
* |
10.2.0 (excluding) |
References