Severity: High
ID: 168930
File Name: newstart_cgsl_NS-SA-2022-0103_rsyslog.nasl
Version: 1.0
Type: local
Published: 12/19/2022
Updated: 12/19/2022
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-24903
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_core:rsyslog, p-cpe:/a:zte:cgsl_core:rsyslog-crypto, p-cpe:/a:zte:cgsl_core:rsyslog-debuginfo, p-cpe:/a:zte:cgsl_core:rsyslog-doc, p-cpe:/a:zte:cgsl_core:rsyslog-elasticsearch, p-cpe:/a:zte:cgsl_core:rsyslog-gnutls, p-cpe:/a:zte:cgsl_core:rsyslog-gssapi, p-cpe:/a:zte:cgsl_core:rsyslog-kafka, p-cpe:/a:zte:cgsl_core:rsyslog-libdbi, p-cpe:/a:zte:cgsl_core:rsyslog-mmaudit, p-cpe:/a:zte:cgsl_core:rsyslog-mmjsonparse, p-cpe:/a:zte:cgsl_core:rsyslog-mmkubernetes, p-cpe:/a:zte:cgsl_core:rsyslog-mmnormalize, p-cpe:/a:zte:cgsl_core:rsyslog-mmsnmptrapd, p-cpe:/a:zte:cgsl_core:rsyslog-mysql, p-cpe:/a:zte:cgsl_core:rsyslog-pgsql, p-cpe:/a:zte:cgsl_core:rsyslog-relp, p-cpe:/a:zte:cgsl_core:rsyslog-snmp, p-cpe:/a:zte:cgsl_core:rsyslog-udpspoof, p-cpe:/a:zte:cgsl_main:rsyslog, p-cpe:/a:zte:cgsl_main:rsyslog-crypto, p-cpe:/a:zte:cgsl_main:rsyslog-debuginfo, p-cpe:/a:zte:cgsl_main:rsyslog-doc, p-cpe:/a:zte:cgsl_main:rsyslog-elasticsearch, p-cpe:/a:zte:cgsl_main:rsyslog-gnutls, p-cpe:/a:zte:cgsl_main:rsyslog-gssapi, p-cpe:/a:zte:cgsl_main:rsyslog-kafka, p-cpe:/a:zte:cgsl_main:rsyslog-libdbi, p-cpe:/a:zte:cgsl_main:rsyslog-mmaudit, p-cpe:/a:zte:cgsl_main:rsyslog-mmjsonparse, p-cpe:/a:zte:cgsl_main:rsyslog-mmkubernetes, p-cpe:/a:zte:cgsl_main:rsyslog-mmnormalize, p-cpe:/a:zte:cgsl_main:rsyslog-mmsnmptrapd, p-cpe:/a:zte:cgsl_main:rsyslog-mysql, p-cpe:/a:zte:cgsl_main:rsyslog-pgsql, p-cpe:/a:zte:cgsl_main:rsyslog-relp, p-cpe:/a:zte:cgsl_main:rsyslog-snmp, p-cpe:/a:zte:cgsl_main:rsyslog-udpspoof, cpe:/o:zte:cgsl_core:5, cpe:/o:zte:cgsl_main:5
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/14/2022
Vulnerability Publication Date: 5/6/2022
CVE: CVE-2022-24903