Severity: High
ID: 239060
File Name: tencentos_TSSA_2024_0958.nasl
Version: 1.3
Type: local
Family: Tencent Local Security Checks
Published: 6/16/2025
Updated: 11/23/2025
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-3493
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2024-25744
CPE: p-cpe:/a:tencent:tencentos_server:kernel, cpe:/o:tencent:tencentos_server:4
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/28/2024
Vulnerability Publication Date: 11/28/2024
CISA Known Exploited Vulnerability Due Dates: 11/10/2022, 10/27/2025
CANVAS (CANVAS)
Core Impact
Metasploit (Netfilter x_tables Heap OOB Write Privilege Escalation)
CVE: CVE-2021-22555, CVE-2021-3493, CVE-2021-46924, CVE-2021-46950, CVE-2021-46977, CVE-2021-46978, CVE-2021-46980, CVE-2021-47008, CVE-2021-47013, CVE-2021-47037, CVE-2021-47042, CVE-2021-47045, CVE-2021-47047, CVE-2021-47048, CVE-2021-47060, CVE-2021-47061, CVE-2021-47062, CVE-2021-47073, CVE-2021-47092, CVE-2021-47094, CVE-2021-47110, CVE-2021-47112, CVE-2021-47136, CVE-2021-47137, CVE-2021-47138, CVE-2021-47146, CVE-2021-47148, CVE-2021-47149, CVE-2021-47150, CVE-2022-4744, CVE-2022-48631, CVE-2022-48635, CVE-2022-48664, CVE-2022-48665, CVE-2022-48667, CVE-2022-48668, CVE-2023-1075, CVE-2023-1829, CVE-2023-52434, CVE-2023-52476, CVE-2023-52482, CVE-2023-52486, CVE-2023-52487, CVE-2023-52488, CVE-2023-52504, CVE-2023-52522, CVE-2023-52568, CVE-2023-52576, CVE-2023-52578, CVE-2023-52590, CVE-2023-52594, CVE-2023-52595, CVE-2023-52614, CVE-2023-52620, CVE-2023-52640, CVE-2023-52643, CVE-2023-52645, CVE-2023-52646, CVE-2023-6040, CVE-2023-6111, CVE-2023-6622, CVE-2023-6817, CVE-2023-6915, CVE-2023-6932, CVE-2023-7192, CVE-2024-0193, CVE-2024-0607, CVE-2024-0646, CVE-2024-1085, CVE-2024-23307, CVE-2024-25744, CVE-2024-26581, CVE-2024-26587, CVE-2024-26594, CVE-2024-26597, CVE-2024-26603, CVE-2024-26604, CVE-2024-26614, CVE-2024-26615, CVE-2024-26618, CVE-2024-26622, CVE-2024-26626, CVE-2024-26632, CVE-2024-26635, CVE-2024-26643, CVE-2024-26651, CVE-2024-26652, CVE-2024-26670, CVE-2024-26674, CVE-2024-26678, CVE-2024-26686, CVE-2024-26692, CVE-2024-26726, CVE-2024-26735, CVE-2024-26792, CVE-2024-26804, CVE-2024-26805, CVE-2024-26808, CVE-2024-26813, CVE-2024-26817, CVE-2024-26835, CVE-2024-26837, CVE-2024-26843, CVE-2024-26845, CVE-2024-26851, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26858, CVE-2024-26872, CVE-2024-26879, CVE-2024-26899, CVE-2024-26910, CVE-2024-26928, CVE-2024-26977, CVE-2024-26989