https://security.gd-linux.com/notice/NS-SA-2025-0206
https://security.gd-linux.com/info/CVE-2020-36516
https://security.gd-linux.com/info/CVE-2021-22600
https://security.gd-linux.com/info/CVE-2021-4135
https://security.gd-linux.com/info/CVE-2021-4197
https://security.gd-linux.com/info/CVE-2021-4204
https://security.gd-linux.com/info/CVE-2021-44879
https://security.gd-linux.com/info/CVE-2021-45402
https://security.gd-linux.com/info/CVE-2022-0185
https://security.gd-linux.com/info/CVE-2022-0330
https://security.gd-linux.com/info/CVE-2022-0435
https://security.gd-linux.com/info/CVE-2022-0492
https://security.gd-linux.com/info/CVE-2022-0847
https://security.gd-linux.com/info/CVE-2022-1011
https://security.gd-linux.com/info/CVE-2022-1016
https://security.gd-linux.com/info/CVE-2022-22942
https://security.gd-linux.com/info/CVE-2022-23222
https://security.gd-linux.com/info/CVE-2022-24448
https://security.gd-linux.com/info/CVE-2022-25636
Severity: High
ID: 266227
File Name: newstart_cgsl_NS-SA-2025-0206_kernel.nasl
Version: 1.1
Type: local
Published: 9/30/2025
Updated: 9/30/2025
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: High
Base Score: 9
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2022-0435
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:kernel, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:kernel-modules, p-cpe:/a:zte:cgsl_main:kata-linux-container, p-cpe:/a:zte:cgsl_main:kernel-devel, p-cpe:/a:zte:cgsl_main:kernel-headers, p-cpe:/a:zte:cgsl_main:kernel-tools, p-cpe:/a:zte:cgsl_main:kernel-tools-libs, p-cpe:/a:zte:cgsl_main:perf, p-cpe:/a:zte:cgsl_main:bpftool, p-cpe:/a:zte:cgsl_main:kernel-core, p-cpe:/a:zte:cgsl_main:kernel-modules-extra, p-cpe:/a:zte:cgsl_main:python3-perf
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/30/2025
Vulnerability Publication Date: 7/21/2021
CISA Known Exploited Vulnerability Due Dates: 5/2/2022, 5/16/2022, 9/11/2024
CVE: CVE-2020-36516, CVE-2021-22600, CVE-2021-4135, CVE-2021-4197, CVE-2021-4204, CVE-2021-44879, CVE-2021-45402, CVE-2022-0185, CVE-2022-0330, CVE-2022-0435, CVE-2022-0492, CVE-2022-0847, CVE-2022-1011, CVE-2022-1016, CVE-2022-22942, CVE-2022-23222, CVE-2022-24448, CVE-2022-25636, CVE-2022-27666, CVE-2022-45919