Vulnerability Details CVE-2023-5623
NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.1%
CVSS Severity
CVSS v3 Score 7.0
Products affected by CVE-2023-5623
-
cpe:2.3:a:tenable:nessus_network_monitor:5.10.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.10.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.11.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.11.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.12.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.12.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.13.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.13.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.4
-
cpe:2.3:a:tenable:nessus_network_monitor:5.4.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.5.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.5.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.6.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.6.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.7.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.7.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.8.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.8.1
-
cpe:2.3:a:tenable:nessus_network_monitor:5.9.0
-
cpe:2.3:a:tenable:nessus_network_monitor:5.9.1