描述
An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present.
AI分析AI驱动
受影响产品
tenablenessus
参考资料
- https://www.tenable.com/security/tns-2022-21Vendor Advisory
- https://www.tenable.com/security/tns-2022-21Vendor Advisory