Tenable Security Update – 04 December 2023

Tenable has released a security update to fix multiple vulnerabilities in Tenable’s third-party components (OpenSSL, HandlebarsJS, jquery-file-upload) across Nessus Network Monitor 6.3.0 and earlier versions.

The addressed vulnerabilities could allow the remote attacker to obtain sensitive information, execute arbitrary code, and gain access to the affected system by sending a specially crafted request.

Sample of the addressed vulnerabilities:

1. HandlebarsJS Module Code Execution Vulnerability (CVE-2021-23383):

  • CVSS: 9.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

2. OpenSSL Information Disclosure Vulnerability (CVE-2023-5363):

  • CVSS: 7.5
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Obtain Information
Vulnerabilities
  • CVE-2023-5363
  • CVE-2021-23369
  • CVE-2021-23383
  • CVE-2018-9206
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Tenable Security Update

References