Severity: Medium
ID: 165896
File Name: EulerOS_SA-2022-2515.nasl
Version: 1.3
Type: local
Family: Huawei Local Security Checks
Published: 10/9/2022
Updated: 10/10/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: Low
Base Score: 3.3
Temporal Score: 2.6
Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2021-3631
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.7
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:huawei:euleros:libvirt, p-cpe:/a:huawei:euleros:libvirt-admin, p-cpe:/a:huawei:euleros:libvirt-client, p-cpe:/a:huawei:euleros:libvirt-daemon, p-cpe:/a:huawei:euleros:libvirt-daemon-config-network, p-cpe:/a:huawei:euleros:libvirt-daemon-config-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-interface, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-network, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nodedev, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-qemu, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-secret, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-core, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-disk, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-gluster, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-logical, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-mpath, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-rbd, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-scsi, p-cpe:/a:huawei:euleros:libvirt-daemon-kvm, p-cpe:/a:huawei:euleros:libvirt-devel, p-cpe:/a:huawei:euleros:libvirt-docs, p-cpe:/a:huawei:euleros:libvirt-libs, p-cpe:/a:huawei:euleros:libvirt-python, cpe:/o:huawei:euleros:uvp:3.0.6.6
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/9/2022
Vulnerability Publication Date: 11/9/2021
CVE: CVE-2021-3631, CVE-2022-0897