Learn about CVE-2022-32974 affecting Nessus 10.1.X and earlier versions. An attacker with authenticated access can read arbitrary files without SSH credentials.
An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
Understanding CVE-2022-32974
This CVE-2022-32974 vulnerability affects the Nessus product, specifically versions Nessus 10.1.X and earlier.
What is CVE-2022-32974?
The CVE-2022-32974 vulnerability allows an authenticated attacker to read arbitrary files from the underlying operating system of the scanner by using a specially crafted compliance audit file without the need for valid SSH credentials.
The Impact of CVE-2022-32974
This vulnerability poses a significant security risk as it can be exploited by an attacker to gain unauthorized access to sensitive files on the system without proper credentials.
Technical Details of CVE-2022-32974
This section covers the technical aspects of the CVE-2022-32974 vulnerability.
Vulnerability Description
The vulnerability allows for unauthorized reading of arbitrary files on the scanner's operating system, which can lead to potential exposure of sensitive information.
Affected Systems and Versions
Nessus versions prior to 10.1.X are affected by this vulnerability, leaving systems running these versions at risk of exploitation.
Exploitation Mechanism
An attacker with authenticated access can exploit this vulnerability by leveraging a specially crafted compliance audit file, bypassing the need for valid SSH credentials.
Mitigation and Prevention
To address CVE-2022-32974 and enhance system security, follow the mitigation and prevention measures outlined below.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates released by Nessus and promptly apply patches to ensure system integrity and protection against known vulnerabilities.