Language:
Severity: Critical
ID: 206821
File Name: nutanix_NXSA-AHV-20230302_100187.nasl
Version: 1.4
Type: local
Family: Misc.
Published: 9/9/2024
Updated: 10/21/2024
Supported Sensors: Nessus
Risk Factor: High
Score: 7.8
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.6
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2021-41043
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 6
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2023-46218
Risk Factor: Critical
Base Score: 9.3
Threat Score: 8.9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score Source: CVE-2023-46218
CPE: cpe:/o:nutanix:ahv
Required KB Items: Host/Nutanix/Data/Node/Version, Host/Nutanix/Data/Node/Type
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/10/2024
Vulnerability Publication Date: 11/6/2020
Metasploit (CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961))
CVE: CVE-2020-28241, CVE-2021-41043, CVE-2022-48624, CVE-2023-28322, CVE-2023-38546, CVE-2023-4408, CVE-2023-46218, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-6135, CVE-2024-1488, CVE-2024-28834, CVE-2024-2961