CVE-2024-3289

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Windows systems where Nessus is installed to a non-default directory. Attackers could exploit insecure permissions on sub-directories to gain elevated privileges. Only affects Nessus installations on Windows with custom installation paths.

💻 Affected Systems

Products:
  • Tenable Nessus
Versions: Versions prior to 10.7.3
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed to non-default directory on Windows. Default installations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM-level privileges on the Windows host, enabling complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Local user with limited privileges escalates to administrator rights, potentially accessing sensitive Nessus scan data and system resources.

🟢

If Mitigated

No impact if Nessus is installed to default directory or proper directory permissions are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the Windows system and knowledge of the non-default installation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.7.3

Vendor Advisory: https://www.tenable.com/security/tns-2024-08

Restart Required: Yes

Instructions:

1. Download Nessus 10.7.3 or later from Tenable. 2. Run the installer. 3. Restart the Nessus service. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Secure Directory Permissions

windows

Manually set secure permissions on Nessus installation directory and sub-directories

icacls "C:\Path\To\Nessus" /inheritance:r /grant "SYSTEM:(OI)(CI)F" /grant "Administrators:(OI)(CI)F" /grant "Users:(OI)(CI)RX"

Reinstall to Default Location

windows

Uninstall Nessus and reinstall to default directory (C:\Program Files\Tenable\Nessus)

🧯 If You Can't Patch

  • Move Nessus installation to default directory (C:\Program Files\Tenable\Nessus)
  • Apply strict ACL permissions to the custom installation directory, removing write access for non-administrative users

🔍 How to Verify

Check if Vulnerable:

Check Nessus version via web interface (Settings > About) or command line: "C:\Program Files\Tenable\Nessus\nessuscli.exe" --version. If version < 10.7.3 AND installed to non-default directory, system is vulnerable.

Check Version:

"C:\Program Files\Tenable\Nessus\nessuscli.exe" --version

Verify Fix Applied:

Confirm version is 10.7.3 or higher via web interface or command line. Verify directory permissions are secure.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in Windows Security logs (Event ID 4672, 4688)
  • Unauthorized access attempts to Nessus directories

Network Indicators:

  • None - this is a local exploit

SIEM Query:

EventID=4672 OR EventID=4688 | where ProcessName contains "nessus" OR CommandLine contains "nessus"

🔗 References

📤 Share & Export