Severity: High
ID: 289240
File Name: miracle_linux_AXSA-2019-3912.nasl
Version: 1.1
Type: local
Published: 1/16/2026
Updated: 1/16/2026
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Vendor Severity: High
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2019-10161
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2019-10168
CPE: p-cpe:/a:miracle:linux:libvirt-daemon-driver-lxc, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-core, p-cpe:/a:miracle:linux:libvirt-daemon-driver-interface, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:miracle:linux:libvirt-daemon-driver-qemu, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:miracle:linux:libvirt-daemon-config-network, p-cpe:/a:miracle:linux:libvirt-daemon-driver-secret, p-cpe:/a:miracle:linux:libvirt-daemon-config-nwfilter, p-cpe:/a:miracle:linux:libvirt-bash-completion, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:miracle:linux:libvirt-daemon-driver-network, cpe:/o:miracle:linux:7, p-cpe:/a:miracle:linux:libvirt-daemon, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:miracle:linux:libvirt-devel, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:miracle:linux:libvirt-daemon-kvm, p-cpe:/a:miracle:linux:libvirt-libs, p-cpe:/a:miracle:linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:miracle:linux:libvirt-daemon-driver-nodedev, p-cpe:/a:miracle:linux:libvirt, p-cpe:/a:miracle:linux:libvirt-client, p-cpe:/a:miracle:linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:miracle:linux:libvirt-docs
Required KB Items: Host/local_checks_enabled, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 6/20/2019
Vulnerability Publication Date: 6/20/2019
CVE: CVE-2019-10161, CVE-2019-10166, CVE-2019-10167, CVE-2019-10168