Severity: Critical
ID: 206765
File Name: newstart_cgsl_NS-SA-2024-1001_openssh.nasl
Version: 1.2
Type: local
Published: 9/8/2024
Updated: 9/18/2024
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.1
Risk Factor: High
Base Score: 7.6
Temporal Score: 6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-6387
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.3
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Risk Factor: Critical
Base Score: 9.2
Threat Score: 8.2
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CPE: p-cpe:/a:zte:cgsl_main:openssh-clients, p-cpe:/a:zte:cgsl_main:openssh-server, cpe:/o:zte:cgsl_main:5, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_core:openssh-server, p-cpe:/a:zte:cgsl_core:openssh-clients, p-cpe:/a:zte:cgsl_main:openssh, p-cpe:/a:zte:cgsl_main:openssh-askpass, p-cpe:/a:zte:cgsl_core:openssh, p-cpe:/a:zte:cgsl_core:openssh-askpass
Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/7/2024
Vulnerability Publication Date: 5/9/2024
CVE: CVE-2024-6387
IAVA: 2024-A-0375