An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Affected Software
| Name | Vendor | Start Version | End Version |
|---|
| Nessus | Tenable | * | 10.2.0 (excluding) |
References