CVE-2022-33757 Vulnerability Details

  /     /     /  

CVE-2022-33757 Metadata Quick Info

CVE Published: 24/10/2022 | CVE Updated: 03/08/2024 | CVE Year: 2022
Source: tenable | Vendor: Tenable, Inc. | Product: Tenable Nessus
Status : PUBLISHED

CVE-2022-33757 Description

An authenticated attacker could read Nessus Debug Log file attachments from the web UI without having the correct privileges to do so. This may lead to the disclosure of information on the scan target and/or the Nessus scan to unauthorized parties able to reach the Nessus instance.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: Broken Access Control
Source: Tenable, Inc.

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).