Severity: High
ID: 239045
File Name: tencentos_TSSA_2023_0153.nasl
Version: 1.4
Type: local
Family: Tencent Local Security Checks
Published: 6/16/2025
Updated: 12/5/2025
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: High
Base Score: 9
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2022-0435
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
Risk Factor: High
Base Score: 8.6
Threat Score: 8.6
Threat Vector: CVSS:4.0/E:A
Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
CVSS Score Source: CVE-2022-1055
CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:kernel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/1/2023
Vulnerability Publication Date: 8/1/2023
CISA Known Exploited Vulnerability Due Dates: 7/8/2025
Core Impact
Metasploit (Local Privilege Escalation via CVE-2023-0386)
CVE: CVE-2021-3759, CVE-2021-45095, CVE-2022-0435, CVE-2022-1016, CVE-2022-1055, CVE-2022-1353, CVE-2022-20154, CVE-2022-2663, CVE-2022-28356, CVE-2022-2905, CVE-2022-2978, CVE-2022-3028, CVE-2022-3061, CVE-2022-3169, CVE-2022-32250, CVE-2022-3303, CVE-2022-3521, CVE-2022-3534, CVE-2022-3621, CVE-2022-3625, CVE-2022-3629, CVE-2022-3646, CVE-2022-3649, CVE-2022-40307, CVE-2022-40768, CVE-2022-41674, CVE-2022-42720, CVE-2022-42721, CVE-2022-42895, CVE-2022-45934, CVE-2022-4662, CVE-2022-47520, CVE-2022-47929, CVE-2023-0386, CVE-2023-1074, CVE-2023-1076, CVE-2023-1095, CVE-2023-1118, CVE-2023-1281, CVE-2023-1380, CVE-2023-23000, CVE-2023-23004, CVE-2023-23454, CVE-2023-23455, CVE-2023-23559, CVE-2023-26545, CVE-2023-32233