CVE-2025-36625
📋 TL;DR
This vulnerability allows unauthenticated attackers to manipulate Nessus logging entries by sending specially crafted HTTP requests. It affects Nessus installations running versions before 10.8.4. The impact is limited to log manipulation rather than system compromise.
💻 Affected Systems
- Tenable Nessus
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could tamper with audit logs to hide malicious activity, potentially obscuring evidence of other attacks or creating false log entries.
Likely Case
Log integrity is compromised, making forensic investigations unreliable and potentially hiding low-level reconnaissance activities.
If Mitigated
With proper network segmentation and access controls, impact is limited to log manipulation without system access.
🎯 Exploit Status
Exploitation requires sending HTTP requests to the Nessus web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.8.4
Vendor Advisory: https://www.tenable.com/security/tns-2025-05
Restart Required: Yes
Instructions:
1. Download Nessus 10.8.4 from Tenable portal. 2. Stop Nessus service. 3. Install the update. 4. Restart Nessus service.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict access to Nessus web interface to trusted IP addresses only.
🧯 If You Can't Patch
- Implement strict network segmentation to limit access to Nessus web interface
- Enable comprehensive logging at network perimeter to detect manipulation attempts
🔍 How to Verify
Check if Vulnerable:
Check Nessus version via web interface or CLI. If version is below 10.8.4, system is vulnerable.
Check Version:
nessuscli --version
Verify Fix Applied:
Verify Nessus version is 10.8.4 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected log entries, missing expected log entries, log timestamp anomalies
Network Indicators:
- HTTP requests to Nessus web interface from untrusted sources
SIEM Query:
source="nessus" AND (http_method="POST" OR http_method="PUT") AND NOT src_ip IN [trusted_ips]