CVE-2018-1154
Summary
| CVE | CVE-2018-1154 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-08-02 19:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | In SecurityCenter versions prior to 5.7.0, a username enumeration issue could allow an unauthenticated attacker to automate the discovery of username aliases via brute force, ultimately facilitating unauthorized access. Server response output has been unified to correct this issue. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Tenable | Securitycenter | All | All | All | All |
| Application | Tenable | Securitycenter | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [R2] SecurityCenter 5.7.0 Fixes Multiple Vulnerabilities - Security Advisory | Tenable® | CONFIRM | www.tenable.com | Patch, Vendor Advisory |
| Tenable SecurityCenter PHP/JQuery Component Bugs Let Remote Users Determine Valid Usernames and Let Remote Authenticated Users Conduct Cross-Site Scripting Attacks - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.