説明
An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present.
AI分析AIによる分析
影響を受ける製品
tenablenessus
参照
- https://www.tenable.com/security/tns-2022-21Vendor Advisory
- https://www.tenable.com/security/tns-2022-21Vendor Advisory