Language:
https://security.gentoo.org/glsa/202412-02
https://bugs.gentoo.org/show_bug.cgi?id=823788
Severity: Critical
ID: 212184
File Name: gentoo_GLSA-202412-02.nasl
Version: 1.2
Type: local
Family: Gentoo Local Security Checks
Published: 12/9/2024
Updated: 12/10/2024
Supported Sensors: Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-0730
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2023-39361
CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:cacti
Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/7/2024
Vulnerability Publication Date: 11/14/2021
CISA Known Exploited Vulnerability Due Dates: 3/9/2023
Core Impact
Metasploit (Cacti 1.2.22 unauthenticated command injection)
CVE: CVE-2020-14424, CVE-2022-0730, CVE-2022-46169, CVE-2022-48547, CVE-2023-30534, CVE-2023-31132, CVE-2023-39357, CVE-2023-39358, CVE-2023-39359, CVE-2023-39360, CVE-2023-39361, CVE-2023-39362, CVE-2023-39365, CVE-2023-39510, CVE-2023-39511, CVE-2023-39512, CVE-2023-39513, CVE-2023-39514, CVE-2023-39515, CVE-2023-39516