This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
NetworkManager did not pin a certificate's subject to an ESSID. A
rogue access point could therefore be used to conduct MITM attacks by
using any other valid certificate issued by same CA as used in the
original network (CVE-2006-7246).
Please note that existing WPA2 Enterprise connections need to be
deleted and re-created to take advantage of the new security checks.
See also :
Update the affected NetworkManager-gnome / NetworkManager / wpa_supplicant / etc packages.
Risk factor :