Vulnerability Description
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenable | Nessus Network Monitor | < 6.3.0 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/tns-2023-34PatchVendor Advisory
- https://www.tenable.com/security/tns-2023-34PatchVendor Advisory
FAQ
What is CVE-2023-5624?
CVE-2023-5624 is a vulnerability with a CVSS score of 7.2 (HIGH). Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injecti...
How severe is CVE-2023-5624?
CVE-2023-5624 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5624?
Check the references section above for vendor advisories and patch information. Affected products include: Tenable Nessus Network Monitor.