CVE-2024-3291

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Windows systems when Nessus Agent is installed to a non-default directory. Attackers could exploit insecure permissions on sub-directories to gain elevated privileges. Only affects users who installed Nessus Agent outside the default location.

💻 Affected Systems

Products:
  • Tenable Nessus Agent
Versions: All versions prior to 10.6.4
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed to non-default directory. Default installation path (C:\Program Files\Tenable\Nessus Agent) is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges on the Windows host, enabling complete system compromise, credential theft, and lateral movement.

🟠

Likely Case

Local authenticated user escalates privileges to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

No impact if Nessus Agent is installed to default directory or proper directory permissions are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the Windows system and knowledge of the non-default installation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.6.4

Vendor Advisory: https://www.tenable.com/security/tns-2024-09

Restart Required: Yes

Instructions:

1. Download Nessus Agent 10.6.4 or later from Tenable. 2. Run the installer to upgrade existing installation. 3. Restart the system or Nessus Agent service.

🔧 Temporary Workarounds

Secure directory permissions

windows

Manually set secure permissions on the non-default installation directory and all sub-directories

icacls "C:\Path\To\NessusAgent" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

Reinstall to default location

windows

Uninstall from non-default location and reinstall to default Program Files directory

🧯 If You Can't Patch

  • Audit all Nessus Agent installations for non-default locations and secure directory permissions
  • Implement least privilege access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Nessus Agent version (should be <10.6.4) and verify installation path is not default

Check Version:

Get-ItemProperty HKLM:\Software\Tenable\NessusAgent\CurrentVersion | Select-Object Version

Verify Fix Applied:

Confirm version is 10.6.4 or later and check directory permissions on installation path

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing privilege escalation attempts
  • Nessus Agent logs showing access to non-default directories

Network Indicators:

  • Unusual Nessus Agent communication patterns post-exploitation

SIEM Query:

EventID=4672 AND ProcessName LIKE '%nessus%' AND SubjectUserName!=SYSTEM

🔗 References

📤 Share & Export