OpenVAS Administrator / Manager Authentication Bypass

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.

Synopsis :

The remote host is running a security scanner management service that
is affected by an authentication bypass vulnerability.

Description :

Nessus was able to exploit an authentication bypass vulnerability by
sending the 'get_version' command. Successful exploitation of this
vulnerability could allow a remote attacker to take complete control
of an OpenVAS install.

See also :

Solution :

Upgrade to OpenVAS Manager 4.0.4 / 3.0.7 or higher, and OpenVAS
Administrator 1.3.2 / 1.2.2 or higher.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.9
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 70919 ()

Bugtraq ID: 63632

CVE ID: CVE-2013-6765

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now