CVE-2025-24915

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Windows systems where Nessus Agent was installed to a non-default location with insecure directory permissions. Attackers could exploit weak permissions on sub-directories to gain elevated privileges. Only affects users who installed Nessus Agent to custom locations without securing those directories.

💻 Affected Systems

Products:
  • Tenable Nessus Agent
Versions: All versions prior to 10.8.3
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed to non-default location AND directories have insecure permissions. Default installations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges on the Windows host, enabling complete system compromise, credential theft, and lateral movement.

🟠

Likely Case

Local user with limited privileges escalates to administrator/SYSTEM level to install malware, modify system configurations, or access sensitive data.

🟢

If Mitigated

Minimal impact if directories are properly secured or agent is installed to default location with correct permissions.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to write to insecure directories. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.8.3

Vendor Advisory: https://www.tenable.com/security/tns-2025-02

Restart Required: No

Instructions:

1. Download Nessus Agent 10.8.3 or later from Tenable portal. 2. Run the installer to upgrade existing installation. 3. Verify installation completed successfully.

🔧 Temporary Workarounds

Secure directory permissions

windows

Manually set proper permissions on Nessus Agent installation directories to prevent unauthorized write access.

icacls "C:\Path\To\NessusAgent" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Audit all non-default Nessus Agent installations and verify directory permissions are properly secured.
  • Consider moving installations to default locations where proper permissions are automatically enforced.

🔍 How to Verify

Check if Vulnerable:

Check if Nessus Agent is installed to non-default location and verify directory permissions using 'icacls' command on Windows.

Check Version:

"C:\Program Files\Tenable\Nessus Agent\nessuscli.exe" --version

Verify Fix Applied:

Verify Nessus Agent version is 10.8.3 or later using the agent interface or check installed programs in Control Panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation/modification in Nessus Agent directories
  • Privilege escalation attempts via Windows Event Logs (Event ID 4672, 4688)

Network Indicators:

  • None - this is a local attack

SIEM Query:

source="windows_security" AND (event_id=4672 OR event_id=4688) AND process_name="*nessus*"

🔗 References

📤 Share & Export