ID CVE-2017-6543
Summary Tenable Nessus before 6.10.2 (as used alone or in Tenable Appliance before 4.5.0) was found to contain a flaw that allowed a remote, authenticated attacker to upload a crafted file that could be written to anywhere on the system. This could be used to subsequently gain elevated privileges on the system (e.g., after a reboot). This issue only affects installations on Windows.
References
Vulnerable Configurations
  • cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
    cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
  • cpe:2.3:a:tenable:nessus:5.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:5.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:5.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.7:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.8:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.9:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:nessus:6.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:nessus:6.10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:appliance:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:appliance:4.4.0:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
refmap via4
bid 96418
confirm http://www.tenable.com/security/tns-2017-06
Last major update 03-10-2019 - 00:03
Published 08-03-2017 - 23:59
Last modified 03-10-2019 - 00:03
Back to Top