Tenable Nessus < 8.11.1 Session Expiration (TNS-2020-06)

high Nessus Plugin ID 139910

Synopsis

Tenable Nessus running on the remote host is affected by a session expiration vulnerability.

Description

According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 8.11.1.
Nessus 8.11.0 and earlier were found to be maintaining sessions longer than the permitted period in certain scenarios.
The lack of proper session expiration allows attackers with local access to login into an existing browser session.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Tenable Nessus version 8.11.1 or later.

See Also

https://www.tenable.com/security/TNS-2020-06

Plugin Details

Severity: High

ID: 139910

File Name: nessus_tns_2020_06.nasl

Version: 1.9

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 8/27/2020

Updated: 2/8/2023

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Low

Base Score: 3.6

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2020-5774

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:nessus

Required KB Items: installed_sw/Tenable Nessus

Exploit Ease: No known exploits are available

Patch Publication Date: 8/20/2020

Vulnerability Publication Date: 8/20/2020

Reference Information

CVE: CVE-2020-5774

IAVB: 2020-B-0049-S