www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3105
Public Scan
URL:
https://www.tenable.com/plugins/nessus/208101
Submission: On October 09 via api from IN — Scanned from CA
Submission: On October 09 via api from IN — Scanned from CA
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Policies OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Policies OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 208101 1. Nessus MICROSOFT EDGE (CHROMIUM) < 129.0.2792.79 MULTIPLE VULNERABILITIES CRITICAL NESSUS PLUGIN ID 208101 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote host has an web browser installed that is affected by multiple vulnerabilities. DESCRIPTION The version of Microsoft Edge installed on the remote Windows host is prior to 129.0.2792.79. It is, therefore, affected by multiple vulnerabilities as referenced in the October 3, 2024 advisory. - Integer overflow in Layout. (CVE-2024-7025) - Insufficient data validation in Mojo. (CVE-2024-9369) - Inappropriate implementation in V8. (CVE-2024-9370) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. SOLUTION Upgrade to Microsoft Edge version 129.0.2792.79 or later. SEE ALSO http://www.nessus.org/u?d78e7347 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7025 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9369 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9370 PLUGIN DETAILS Severity: Critical ID: 208101 File Name: microsoft_edge_chromium_129_0_2792_79.nasl Version: 1.1 Type: local Agent: windows Family: Windows Published: 10/3/2024 Updated: 10/3/2024 Supported Sensors: Nessus Agent, Nessus RISK INFORMATION VPR Risk Factor: Medium Score: 6.0 CVSS V2 Risk Factor: High Base Score: 7.5 Temporal Score: 5.5 Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P CVSS Score Source: CVE-2024-9370 CVSS V3 Risk Factor: Critical Base Score: 9.8 Temporal Score: 8.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C VULNERABILITY INFORMATION CPE: cpe:/a:microsoft:edge Required KB Items: SMB/Registry/Enumerated, installed_sw/Microsoft Edge (Chromium) Exploit Ease: No known exploits are available Patch Publication Date: 10/3/2024 Vulnerability Publication Date: 10/1/2024 REFERENCE INFORMATION CVE: CVE-2024-7025, CVE-2024-9369, CVE-2024-9370 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance