Learn about CVE-2020-5794, a vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows allowing local privilege escalation. Find mitigation steps and prevention measures.
A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
Understanding CVE-2020-5794
This CVE identifies a Local Privilege Escalation vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows.
What is CVE-2020-5794?
The vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows allows an authenticated local attacker to execute arbitrary code by manipulating user-supplied files in a specific directory.
The Impact of CVE-2020-5794
This vulnerability could lead to a local privilege escalation, enabling an attacker with valid credentials to run malicious code on the affected Windows system.
Technical Details of CVE-2020-5794
The following technical details provide insight into the vulnerability:
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2020-5794, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates