CVE-2023-2005 Report - Details, Severity, & Advisories
Twingate Team
•
May 30, 2024
CVE-2023-2005 is a security vulnerability affecting certain Tenable products, including Tenable.io, Nessus, and Security Center. This vulnerability, rated as high severity by NIST and medium severity by Tenable, could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location and escalate privileges. Systems running these Tenable products before a specified Plugin Feed ID are at risk.
How do I know if I'm affected?
To determine if you're affected by the vulnerability, check if you're using Tenable.io, Nessus, or Security Center before Plugin Feed ID #202306261202. This vulnerability could allow a malicious actor with sufficient permissions to place a binary in a specific location and escalate privileges.
What should I do if I'm affected?
If you're affected by the vulnerability, update your Tenable plugins to resolve the issue. Ensure your Plugin Feed ID is equal to or greater than #202306261202. This will help protect your system from potential privilege escalation by malicious actors.
Is CVE-2023-2005 in CISA’s Known Exploited Vulnerabilities Catalog?
CVE-2023-2005 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue, discovered in certain Tenable products, could allow someone with enough permissions to misuse a plugin and gain more control. The vulnerability was published on June 26, 2023. There is no specified due date or required action, but Tenable has already fixed the issue and distributed updates to protect users.
Weakness enumeration
The weakness in CVE-2023-2005 is identified as NVD-CWE-noinfo (Insufficient Information) and is related to a privilege escalation vulnerability in a Nessus plugin.
For more details
CVE-2023-2005 is a security vulnerability affecting Tenable products, with detailed information available on the NVD page. For further insights, explore the resources listed below.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2023-2005 Report - Details, Severity, & Advisories
Twingate Team
•
May 30, 2024
CVE-2023-2005 is a security vulnerability affecting certain Tenable products, including Tenable.io, Nessus, and Security Center. This vulnerability, rated as high severity by NIST and medium severity by Tenable, could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location and escalate privileges. Systems running these Tenable products before a specified Plugin Feed ID are at risk.
How do I know if I'm affected?
To determine if you're affected by the vulnerability, check if you're using Tenable.io, Nessus, or Security Center before Plugin Feed ID #202306261202. This vulnerability could allow a malicious actor with sufficient permissions to place a binary in a specific location and escalate privileges.
What should I do if I'm affected?
If you're affected by the vulnerability, update your Tenable plugins to resolve the issue. Ensure your Plugin Feed ID is equal to or greater than #202306261202. This will help protect your system from potential privilege escalation by malicious actors.
Is CVE-2023-2005 in CISA’s Known Exploited Vulnerabilities Catalog?
CVE-2023-2005 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue, discovered in certain Tenable products, could allow someone with enough permissions to misuse a plugin and gain more control. The vulnerability was published on June 26, 2023. There is no specified due date or required action, but Tenable has already fixed the issue and distributed updates to protect users.
Weakness enumeration
The weakness in CVE-2023-2005 is identified as NVD-CWE-noinfo (Insufficient Information) and is related to a privilege escalation vulnerability in a Nessus plugin.
For more details
CVE-2023-2005 is a security vulnerability affecting Tenable products, with detailed information available on the NVD page. For further insights, explore the resources listed below.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2023-2005 Report - Details, Severity, & Advisories
Twingate Team
•
May 30, 2024
CVE-2023-2005 is a security vulnerability affecting certain Tenable products, including Tenable.io, Nessus, and Security Center. This vulnerability, rated as high severity by NIST and medium severity by Tenable, could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location and escalate privileges. Systems running these Tenable products before a specified Plugin Feed ID are at risk.
How do I know if I'm affected?
To determine if you're affected by the vulnerability, check if you're using Tenable.io, Nessus, or Security Center before Plugin Feed ID #202306261202. This vulnerability could allow a malicious actor with sufficient permissions to place a binary in a specific location and escalate privileges.
What should I do if I'm affected?
If you're affected by the vulnerability, update your Tenable plugins to resolve the issue. Ensure your Plugin Feed ID is equal to or greater than #202306261202. This will help protect your system from potential privilege escalation by malicious actors.
Is CVE-2023-2005 in CISA’s Known Exploited Vulnerabilities Catalog?
CVE-2023-2005 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue, discovered in certain Tenable products, could allow someone with enough permissions to misuse a plugin and gain more control. The vulnerability was published on June 26, 2023. There is no specified due date or required action, but Tenable has already fixed the issue and distributed updates to protect users.
Weakness enumeration
The weakness in CVE-2023-2005 is identified as NVD-CWE-noinfo (Insufficient Information) and is related to a privilege escalation vulnerability in a Nessus plugin.
For more details
CVE-2023-2005 is a security vulnerability affecting Tenable products, with detailed information available on the NVD page. For further insights, explore the resources listed below.
Solutions
Solutions
The VPN replacement your workforce will love.
Solutions