Severity: High
ID: 167505
File Name: newstart_cgsl_NS-SA-2022-0077_cyrus-sasl.nasl
Version: 1.2
Type: local
Published: 11/15/2022
Updated: 11/15/2022
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 4.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS Score Source: CVE-2022-24407
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:cyrus-sasl-ntlm, cpe:/o:zte:cgsl_main:5, p-cpe:/a:zte:cgsl_core:cyrus-sasl-sql, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_main:cyrus-sasl-md5, p-cpe:/a:zte:cgsl_main:cyrus-sasl-debuginfo, p-cpe:/a:zte:cgsl_core:cyrus-sasl-gs2, p-cpe:/a:zte:cgsl_core:cyrus-sasl-debuginfo, p-cpe:/a:zte:cgsl_core:cyrus-sasl-ntlm, p-cpe:/a:zte:cgsl_core:cyrus-sasl-gssapi, p-cpe:/a:zte:cgsl_main:cyrus-sasl-plain, p-cpe:/a:zte:cgsl_main:cyrus-sasl-sql, p-cpe:/a:zte:cgsl_main:cyrus-sasl-lib, p-cpe:/a:zte:cgsl_core:cyrus-sasl, p-cpe:/a:zte:cgsl_core:cyrus-sasl-plain, p-cpe:/a:zte:cgsl_core:cyrus-sasl-ldap, p-cpe:/a:zte:cgsl_core:cyrus-sasl-devel, p-cpe:/a:zte:cgsl_main:cyrus-sasl-devel, p-cpe:/a:zte:cgsl_main:cyrus-sasl-gssapi, p-cpe:/a:zte:cgsl_main:cyrus-sasl, p-cpe:/a:zte:cgsl_main:cyrus-sasl-ldap, p-cpe:/a:zte:cgsl_main:cyrus-sasl-scram, p-cpe:/a:zte:cgsl_core:cyrus-sasl-md5, p-cpe:/a:zte:cgsl_core:cyrus-sasl-lib, p-cpe:/a:zte:cgsl_core:cyrus-sasl-scram, p-cpe:/a:zte:cgsl_main:cyrus-sasl-gs2
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 11/9/2022
Vulnerability Publication Date: 2/23/2022
CVE: CVE-2022-24407