Tenable Nessus < 7.0.3 Sub-directory Missing Secure Permission Local Privilege Escalation (TNS-2018-01)

high Nessus Plugin ID 108689

Synopsis

An application running on the remote host is affected by a local privilege escalation vulnerability.

Description

According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.0.3. It is, therefore, affected by a local privilege escalation vulnerability due to the program failing to enforce secure permissions for sub-directories when a directory is installed outside of the default location.

This plugin is only checking the remote version and has not checked for installation location.

Solution

Upgrade to Tenable Nessus version 7.0.3 or later.

See Also

https://www.tenable.com/security/tns-2018-01

Plugin Details

Severity: High

ID: 108689

File Name: nessus_tns_2018_01.nasl

Version: 1.7

Type: remote

Agent: windows

Family: Windows

Published: 3/28/2018

Updated: 6/12/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.4

Temporal Score: 3.3

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-1141

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.1

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:nessus

Required KB Items: Settings/ParanoidReport, installed_sw/Tenable Nessus

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2018

Vulnerability Publication Date: 3/19/2018

Reference Information

CVE: CVE-2018-1141