Vulnerability identifier: #VU51578
Vulnerability risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Nessus Agent
Client/Desktop applications /
Other client software
Vendor: Tenable Network Security
Description
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to Nessus Agent inadvertently
captures the IAM role security token on the local host during initial
linking of the Nessus Agent when installed on an Amazon EC2 instance. A local privileged user can obtain the token.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Nessus Agent: 7.2.0 - 8.2.2
External links
https://www.tenable.com/security/tns-2021-04-0
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.