Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nessus | Tenable | * | 10.6.2 (excluding) |
Nessus_agent | Tenable | * | 10.4.3 (excluding) |