Tenable Nessus Agent < 8.2.4 Multiple Vulnerabilities (TNS-2021-08)

high Nessus Plugin ID 148392

Synopsis

An instance of Nessus Agent installed on the remote system is affected by multiple vulnerabilities

Description

According to its self-reported version, the Tenable Nessus agent running on the remote host is prior to 8.2.4. It is, therefore, affected by multiple vulnerabilities. Nessus Agent leverages third-party software to help provide underlying functionality. Two separate third-party components (OpenSSL and sqlite) were found to contain vulnerabilities, and updated versions have been made available by the providers.

Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues. Nessus Agent 8.2.4 will update OpenSSL to version 1.1.1k and sqlite to version 3.34.1 to address the identified vulnerabilities.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Tenable Nessus Agent version 8.2.4 or later.

See Also

https://www.tenable.com/security/tns-2021-08

Plugin Details

Severity: High

ID: 148392

File Name: tenable_nessus_agent_tns_2021_08.nasl

Version: 1.7

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 4/8/2021

Updated: 12/5/2022

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2021-3450

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:nessus_agent

Required KB Items: installed_sw/Tenable Nessus Agent

Exploit Ease: No known exploits are available

Patch Publication Date: 4/8/2021

Vulnerability Publication Date: 9/9/2019

Reference Information

CVE: CVE-2019-16168, CVE-2021-3450

IAVA: 2021-A-0149-S