Severity: High
ID: 216020
File Name: EulerOS_SA-2025-1140.nasl
Version: 1.1
Type: local
Family: Huawei Local Security Checks
Published: 2/10/2025
Updated: 2/10/2025
Supported Sensors: Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2024-53142
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp
Excluded KB Items: Host/EulerOS/uvp_version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/8/2025
Vulnerability Publication Date: 8/17/2024
CISA Known Exploited Vulnerability Due Dates: 2/26/2025
CVE: CVE-2022-48868, CVE-2022-48916, CVE-2022-48961, CVE-2022-48975, CVE-2023-52917, CVE-2023-52920, CVE-2024-43817, CVE-2024-44958, CVE-2024-46678, CVE-2024-46714, CVE-2024-46765, CVE-2024-46830, CVE-2024-47668, CVE-2024-47674, CVE-2024-47678, CVE-2024-47679, CVE-2024-47684, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47697, CVE-2024-47701, CVE-2024-47705, CVE-2024-47707, CVE-2024-47710, CVE-2024-47728, CVE-2024-47730, CVE-2024-47737, CVE-2024-47739, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-49851, CVE-2024-49856, CVE-2024-49858, CVE-2024-49861, CVE-2024-49863, CVE-2024-49875, CVE-2024-49878, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49889, CVE-2024-49891, CVE-2024-49899, CVE-2024-49906, CVE-2024-49907, CVE-2024-49925, CVE-2024-49927, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49940, CVE-2024-49944, CVE-2024-49948, CVE-2024-49949, CVE-2024-49952, CVE-2024-49954, CVE-2024-49955, CVE-2024-49959, CVE-2024-49960, CVE-2024-49974, CVE-2024-49975, CVE-2024-49978, CVE-2024-49983, CVE-2024-49995, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50014, CVE-2024-50015, CVE-2024-50016, CVE-2024-50024, CVE-2024-50028, CVE-2024-50033, CVE-2024-50038, CVE-2024-50039, CVE-2024-50040, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50058, CVE-2024-50060, CVE-2024-50063, CVE-2024-50067, CVE-2024-50072, CVE-2024-50073, CVE-2024-50074, CVE-2024-50082, CVE-2024-50095, CVE-2024-50099, CVE-2024-50115, CVE-2024-50131, CVE-2024-50135, CVE-2024-50138, CVE-2024-50142, CVE-2024-50143, CVE-2024-50150, CVE-2024-50151, CVE-2024-50154, CVE-2024-50167, CVE-2024-50179, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50199, CVE-2024-50208, CVE-2024-50209, CVE-2024-50241, CVE-2024-50251, CVE-2024-50256, CVE-2024-50258, CVE-2024-50262, CVE-2024-50264, CVE-2024-50267, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50289, CVE-2024-50296, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-50304, CVE-2024-53052, CVE-2024-53057, CVE-2024-53063, CVE-2024-53066, CVE-2024-53073, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53095, CVE-2024-53096, CVE-2024-53099, CVE-2024-53104, CVE-2024-53119, CVE-2024-53121, CVE-2024-53141, CVE-2024-53142