Language:
Severity: Medium
ID: 222935
File Name: unpatched_CVE_2019_3886.nasl
Version: 1.3
Type: local
Agent: unix
Family: Misc.
Published: 3/4/2025
Updated: 9/10/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 3.3
Risk Factor: Medium
Base Score: 4.8
Temporal Score: 3.8
Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:P
CVSS Score Source: CVE-2019-3886
Risk Factor: Medium
Base Score: 5.4
Temporal Score: 4.9
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:libvirt, p-cpe:/a:centos:centos:libvirt-libs, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage, p-cpe:/a:centos:centos:libvirt-daemon-driver-qemu, p-cpe:/a:redhat:enterprise_linux:libvirt, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:centos:centos:libvirt-daemon-driver-network, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage, p-cpe:/a:centos:centos:libvirt-wireshark, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:centos:centos:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:redhat:enterprise_linux:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-qemu, p-cpe:/a:centos:centos:libvirt-daemon-driver-nodedev, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-disk, p-cpe:/a:centos:centos:libvirt-devel, p-cpe:/a:centos:centos:libvirt-lock-sanlock, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:centos:centos:libvirt-daemon-driver-interface, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-core, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-network, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-gluster, p-cpe:/a:centos:centos:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-kvm, cpe:/o:centos:centos:8, p-cpe:/a:redhat:enterprise_linux:libvirt-nss, p-cpe:/a:centos:centos:libvirt-daemon-config-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:centos:centos:libvirt-daemon-kvm, p-cpe:/a:centos:centos:libvirt-docs, p-cpe:/a:redhat:enterprise_linux:libvirt-admin, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-rbd, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:redhat:enterprise_linux:libvirt-wireshark, p-cpe:/a:redhat:enterprise_linux:libvirt-devel, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-interface, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-scsi, cpe:/a:redhat:advanced_virtualization:8::el8, p-cpe:/a:centos:centos:libvirt-daemon-config-nwfilter, p-cpe:/a:centos:centos:libvirt-daemon-driver-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:centos:centos:libvirt-daemon, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-core, p-cpe:/a:redhat:enterprise_linux:libvirt-docs, p-cpe:/a:centos:centos:libvirt-admin, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-network, p-cpe:/a:redhat:enterprise_linux:libvirt-libs, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:redhat:enterprise_linux:libvirt-bash-completion, p-cpe:/a:centos:centos:libvirt-nss, p-cpe:/a:centos:centos:libvirt-bash-completion, p-cpe:/a:centos:centos:libvirt-daemon-driver-storage-mpath
Required KB Items: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 4/3/2019
CVE: CVE-2019-3886