Tenable Log Correlation Engine (LCE) < 5.1.1 (TNS-2018-13)

medium Nessus Plugin ID 118399
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3.6


A data aggregation application installed on the remote host is affected by a denial of service vulnerability.


The version of Tenable Log Correlation Engine (LCE) installed on the remote host is a version prior to 5.1.1. It is, therefore, affected by multiple vulnerabilities:

- A flaw exists in the bundled third-party component OpenSSL library's key handling during a TLS handshake that causes a denial of service vulnerability due to key handling during a TLS handshake. (CVE-2018-0732)

- A flaw exists in the bundled third-party component OpenSSL library's RSA Key generation algorithm that allows a cache timing side channel attack to recover the private key. (CVE-2018-0737)


Upgrade to Tenable LCE version 5.1.1 or later.

See Also



Plugin Details

Severity: Medium

ID: 118399

File Name: lce_5_1_1.nasl

Version: 1.4

Type: local

Family: Misc.

Published: 10/26/2018

Updated: 11/1/2019

Dependencies: lce_installed.nbin

Risk Information

Risk Factor: Medium

VPR Score: 3.6

CVSS Score Source: CVE-2018-0737

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:log_correlation_engine

Required KB Items: installed_sw/Log Correlation Engine Server

Exploit Ease: No known exploits are available

Patch Publication Date: 10/23/2018

Vulnerability Publication Date: 10/23/2018

Reference Information

CVE: CVE-2018-0732, CVE-2018-0737