https://alas.aws.amazon.com//AL2/ALAS2-2026-3277.html
Severity: High
ID: 311217
File Name: al2_ALAS-2026-3277.nasl
Version: 1.1
Type: Local
Agent: unix
Published: 4/30/2026
Updated: 4/30/2026
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: High
Base Score: 7.1
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N
CVSS Score Source: CVE-2026-5795
Risk Factor: High
Base Score: 7.4
Temporal Score: 6.4
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:jetty-websocket-api, p-cpe:/a:amazon:linux:jetty-util-ajax, p-cpe:/a:amazon:linux:jetty-server, p-cpe:/a:amazon:linux:jetty-client, p-cpe:/a:amazon:linux:jetty-annotations, p-cpe:/a:amazon:linux:jetty-util, p-cpe:/a:amazon:linux:jetty-jndi, p-cpe:/a:amazon:linux:jetty-project, p-cpe:/a:amazon:linux:jetty-servlet, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:jetty-monitor, p-cpe:/a:amazon:linux:jetty-websocket-client, p-cpe:/a:amazon:linux:jetty-jaas, p-cpe:/a:amazon:linux:jetty-webapp, p-cpe:/a:amazon:linux:jetty-jsp, p-cpe:/a:amazon:linux:jetty-maven-plugin, p-cpe:/a:amazon:linux:jetty-runner, p-cpe:/a:amazon:linux:jetty-rewrite, p-cpe:/a:amazon:linux:jetty-websocket-common, p-cpe:/a:amazon:linux:jetty-deploy, p-cpe:/a:amazon:linux:jetty-start, p-cpe:/a:amazon:linux:jetty-jspc-maven-plugin, p-cpe:/a:amazon:linux:jetty-io, p-cpe:/a:amazon:linux:jetty-proxy, p-cpe:/a:amazon:linux:jetty-websocket-parent, p-cpe:/a:amazon:linux:jetty-servlets, p-cpe:/a:amazon:linux:jetty-continuation, p-cpe:/a:amazon:linux:jetty-jmx, p-cpe:/a:amazon:linux:jetty-plus, p-cpe:/a:amazon:linux:jetty-xml, p-cpe:/a:amazon:linux:jetty-ant, p-cpe:/a:amazon:linux:jetty-websocket-server, p-cpe:/a:amazon:linux:jetty-javadoc, p-cpe:/a:amazon:linux:jetty-http, p-cpe:/a:amazon:linux:jetty-jaspi, p-cpe:/a:amazon:linux:jetty-websocket-servlet, p-cpe:/a:amazon:linux:jetty-security
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 4/30/2026
Vulnerability Publication Date: 4/8/2026
CVE: CVE-2026-5795