Nutanix AHV : Multiple Vulnerabilities (NXSA-AHV-11.0)

high Nessus Plugin ID 278723

Synopsis

The Nutanix AHV host is affected by multiple vulnerabilities .

Description

The version of AHV installed on the remote host is prior to AHV-11.0. It is, therefore, affected by multiple vulnerabilities as referenced in the NXSA-AHV-11.0 advisory.

- There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above. (CVE-2025-6965)

- ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. (CVE-2022-29458)

- There is a defect in the CPython tarfile module affecting the TarFile extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch after importing the tarfile module:
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1 (CVE-2025-8194)

- xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes. (CVE-2024-55549)

- numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. (CVE-2025-24855)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the Nutanix AHV software to the recommended version. Before upgrading: if this cluster is registered with Prism Central, ensure that Prism Central has been upgraded first to a compatible version. Refer to the Software Product Interoperability page on the Nutanix portal.

See Also

http://www.nessus.org/u?751ef350

Plugin Details

Severity: High

ID: 278723

File Name: nutanix_NXSA-AHV-11_0.nasl

Version: 1.2

Type: local

Family: Misc.

Published: 12/15/2025

Updated: 12/16/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2022-29458

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2025-6965

CVSS v4

Risk Factor: High

Base Score: 8.7

Threat Score: 8.7

Threat Vector: CVSS:4.0/E:A

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-5994

Vulnerability Information

CPE: cpe:/o:nutanix:ahv

Required KB Items: Host/Nutanix/Data/Node/Version, Host/Nutanix/Data/Node/Type

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/15/2025

Vulnerability Publication Date: 4/29/2020

CISA Known Exploited Vulnerability Due Dates: 2/13/2025, 5/27/2025

Reference Information

CVE: CVE-2020-11023, CVE-2022-29458, CVE-2022-49043, CVE-2023-36617, CVE-2023-49083, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727, CVE-2024-10041, CVE-2024-10963, CVE-2024-11187, CVE-2024-12087, CVE-2024-12088, CVE-2024-12133, CVE-2024-12243, CVE-2024-12718, CVE-2024-12747, CVE-2024-1298, CVE-2024-1488, CVE-2024-23337, CVE-2024-24786, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-28956, CVE-2024-34064, CVE-2024-35176, CVE-2024-3596, CVE-2024-38796, CVE-2024-4032, CVE-2024-42472, CVE-2024-43420, CVE-2024-45332, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2024-52533, CVE-2024-52615, CVE-2024-54661, CVE-2024-55549, CVE-2024-5564, CVE-2024-56171, CVE-2024-56326, CVE-2024-5742, CVE-2024-6232, CVE-2024-6345, CVE-2024-6923, CVE-2024-8176, CVE-2024-8508, CVE-2025-0395, CVE-2025-20012, CVE-2025-20623, CVE-2025-24495, CVE-2025-24528, CVE-2025-24855, CVE-2025-24928, CVE-2025-25724, CVE-2025-27363, CVE-2025-32414, CVE-2025-32415, CVE-2025-32462, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-3576, CVE-2025-40909, CVE-2025-4138, CVE-2025-4330, CVE-2025-4373, CVE-2025-4435, CVE-2025-4517, CVE-2025-47273, CVE-2025-48060, CVE-2025-49794, CVE-2025-49796, CVE-2025-5318, CVE-2025-53905, CVE-2025-53906, CVE-2025-54389, CVE-2025-5702, CVE-2025-5914, CVE-2025-5994, CVE-2025-6020, CVE-2025-6021, CVE-2025-6395, CVE-2025-6965, CVE-2025-7425, CVE-2025-8058, CVE-2025-8194, CVE-2025-8941