
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-32973 is a security vulnerability discovered in Tenable's Nessus product that affects PowerShell cmdlet checks. The vulnerability was disclosed on June 21, 2022, and affects Nessus versions 10.1.2 and earlier, as well as Nessus Agent 8.3.3 and earlier. This vulnerability allows an authenticated attacker to create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges (Tenable Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability specifically relates to the custom Audit functionality in Nessus, where an authenticated attacker could manipulate audit files to bypass security checks (NVD, Tenable Advisory).
If exploited, this vulnerability allows an authenticated attacker to execute commands with administrator privileges, potentially leading to complete system compromise. The vulnerability affects the confidentiality, integrity, and availability of the system with high severity ratings across all three aspects (Tenable Advisory).
Tenable has released patches to address this vulnerability. Users should upgrade to Nessus version 10.2.0 or later, or Nessus Agent version 8.3.4 or later. The fix includes enabling the ability to sign and verify custom audit files to prevent unauthorized modifications (Tenable Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."