HIGH · 7.2

CVE-2023-5624

Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injecti...

Vulnerability Description

Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
TenableNessus Network Monitor< 6.3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-5624?

CVE-2023-5624 is a vulnerability with a CVSS score of 7.2 (HIGH). Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injecti...

How severe is CVE-2023-5624?

CVE-2023-5624 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-5624?

Check the references section above for vendor advisories and patch information. Affected products include: Tenable Nessus Network Monitor.