Tenable Nessus < 8.1.1 Multiple Vulnerabilities (TNS-2018-16)

medium Nessus Plugin ID 120197


Tenable Nessus running on the remote host is affected by multiple vulnerabilities.


According to its self-reported version, the Tenable Nessus application running on the remote host is 8.x prior to 8.1.1. It is, therefore, affected by multiple vulnerabilities:

- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack.
An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734)

- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)


Upgrade to Tenable Nessus version 8.1.1 or later.

See Also


Plugin Details

Severity: Medium

ID: 120197

File Name: nessus_tns_2018_16.nasl

Version: 1.4

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 1/2/2019

Updated: 2/8/2023

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-0734


Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:nessus

Required KB Items: installed_sw/Tenable Nessus

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/20/2018

Vulnerability Publication Date: 10/23/2018

Reference Information

CVE: CVE-2018-0734, CVE-2018-5407