ID CVE-2018-1154
Summary In SecurityCenter versions prior to 5.7.0, a username enumeration issue could allow an unauthenticated attacker to automate the discovery of username aliases via brute force, ultimately facilitating unauthorized access. Server response output has been unified to correct this issue.
References
Vulnerable Configurations
  • cpe:2.3:a:tenable:securitycenter:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:securitycenter:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:securitycenter:4.7:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:securitycenter:4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:securitycenter:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:securitycenter:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:securitycenter:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:securitycenter:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tenable:securitycenter:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:tenable:securitycenter:5.5.2:*:*:*:*:*:*:*
CVSS
Base: 3.3 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:A/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm https://www.tenable.com/security/tns-2018-11
sectrack 1041431
Last major update 03-10-2019 - 00:03
Published 02-08-2018 - 19:29
Last modified 03-10-2019 - 00:03
Back to Top