Language:
Severity: Critical
ID: 197084
File Name: nutanix_NXSA-AOS-6_8.nasl
Version: 1.11
Type: local
Family: Misc.
Published: 5/15/2024
Updated: 7/25/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-2068
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-22978
CPE: cpe:/o:nutanix:aos
Required KB Items: Host/Nutanix/Data/lts, Host/Nutanix/Data/Service, Host/Nutanix/Data/Version, Host/Nutanix/Data/arch
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/15/2024
Vulnerability Publication Date: 11/14/2008
Metasploit (runc (docker) File Descriptor Leak Privilege Escalation)
CVE: CVE-2008-5161, CVE-2019-1547, CVE-2019-1551, CVE-2019-1552, CVE-2019-1563, CVE-2020-1968, CVE-2020-1971, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, CVE-2021-3712, CVE-2022-0778, CVE-2022-1292, CVE-2022-2068, CVE-2022-22950, CVE-2022-22978, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-1981, CVE-2023-20861, CVE-2023-27043, CVE-2023-34058, CVE-2023-34059, CVE-2023-4016, CVE-2023-41080, CVE-2023-46589, CVE-2023-52323, CVE-2023-5388, CVE-2023-5678, CVE-2023-5981, CVE-2023-7104, CVE-2024-20918, CVE-2024-20919, CVE-2024-20921, CVE-2024-20926, CVE-2024-20932, CVE-2024-20945, CVE-2024-20952, CVE-2024-21626