Vulnerabilities Details

  • Home
  • Vulnerabilities Details

ZMC-2021.09.08.1700

Nessus Agent: Multiple vulnerabilities

Operating System:

[WIN][UNIX/LINUX]

Published:

8th Sep 2021

VulnerabilitiesZMC-2021.09.08.1700


===========================================================================
                         ZMCIRT Vulnerability Bulletin

                             ZMC-2021.09.08.1700
                      Nessus Agent: Multiple vulnerabilities
                               8th Sep 2021

===========================================================================
Product:           Nessus Agent
Publisher:         Tenable
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Increased Privileges            -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20118 CVE-2021-20117 

Original Bulletin: 
   https://www.tenable.com/security/tns-2021-15

- --------------------------BEGIN INCLUDED TEXT--------------------

[R1] Nessus Agent 8.3.1 Fixes Multiple Vulnerabilities

High

Synopsis

Nessus Agent 8.3.0 and earlier for were found to contain multiple local
privilege escalation vulnerabilities which could allow an authenticated, local
administrator to run specific executables on the Nessus Agent host.

Solution

Tenable has released Nessus Agent 8.3.1 to address these issues. The
installation files can be obtained from the Tenable Downloads Portal ( https://
www.tenable.com/downloads/nessus-agents ).

Additional References

https://docs.tenable.com/releasenotes/Content/nessusagent/agent831.htm

This page contains information regarding security vulnerabilities that may
impact Tenable's products. This may include issues specific to our software, or
due to the use of third-party libraries within our software. Tenable strongly
encourages users to ensure that they upgrade or apply relevant patches in a
timely manner.

Tenable takes product security very seriously. If you believe you have found a
vulnerability in one of our products, we ask that you please work with us to
quickly resolve it in order to protect customers. Tenable believes in
responding quickly to such reports, maintaining communication with researchers,
and providing a solution in short order.

For more details on submitting vulnerability information, please see our 
Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email  

Risk Information

CVE ID: CVE-2021-20117
CVE-2021-20118
Tenable Advisory ID:
TNS-2021-15
Risk Factor:
High
CVSSv3 Base / Temporal Score:
6.5 / 5.7 (CVE-2021-20117)
8.4 / 7.3 (CVE-2021-20118)
CVSSv3 Vector:
AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C (CVE-2021-20117)
AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C (CVE-2021-20118)

Affected Products

Nessus Agent 8.3.0 and earlier

Advisory Timeline

2021-09-07 - [R1] Initial Release


 
ZMCIRT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. ZMCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Internet Email: report@cirt.zm     
Telephone:     7070 
                ZMCIRT personnel answer during Zambian business hours 
                which are 8am to 5pm.
                On call after hours for member emergencies only.
===========================================================================

Copyright @2023 ZAMBIA CIRT