This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
NetworkManager did not pin a certificate's subject to an ESSID. A
rogue access point could therefore be used to conduct MITM attacks by
using any other valid certificate issued by same CA as used in the
original network (CVE-2006-7246).
Please note that existing WPA2 Enterprise connections need to be
deleted and re-created to take advantage of the new security checks.
NetworkManager did not honor the PolicyKit auth_admin setting when
creating Ad-Hoc wireless networks (CVE-2011-2176)
See also :
Update the affected NetworkManager packages.
Risk factor :
Low / CVSS Base Score : 2.1