CVE-2025-36631
📋 TL;DR
In Tenable Agent versions before 10.8.5 on Windows, a non-administrative user can overwrite arbitrary local system files with log content using SYSTEM privileges. This allows local privilege escalation and system file manipulation. Only Windows systems running vulnerable Tenable Agent versions are affected.
💻 Affected Systems
- Tenable Agent
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via SYSTEM privilege escalation, allowing attackers to overwrite critical system files, install persistent malware, or disable security controls.
Likely Case
Local privilege escalation leading to unauthorized administrative access, data theft, or lateral movement within the network.
If Mitigated
Limited impact if proper access controls and monitoring are in place, though the vulnerability still presents a significant local attack vector.
🎯 Exploit Status
Exploitation requires local user access but no administrative privileges. The vulnerability is relatively straightforward to exploit once identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.8.5
Vendor Advisory: https://www.tenable.com/security/tns-2025-11
Restart Required: Yes
Instructions:
1. Download Tenable Agent version 10.8.5 or later from the Tenable portal. 2. Run the installer with administrative privileges. 3. Restart the system to complete the installation.
🔧 Temporary Workarounds
Restrict Local User Access
windowsLimit non-administrative user access to systems running Tenable Agent to reduce attack surface.
🧯 If You Can't Patch
- Implement strict access controls to limit which users can log into systems running Tenable Agent.
- Monitor for unusual file modification activities, particularly in system directories, and implement file integrity monitoring.
🔍 How to Verify
Check if Vulnerable:
Check Tenable Agent version via Control Panel > Programs and Features or using command: 'sc query TenableAgent' and verify version is below 10.8.5.
Check Version:
sc query TenableAgent | findstr /i "display_name"
Verify Fix Applied:
Confirm Tenable Agent version is 10.8.5 or higher using the same methods as checking vulnerability.
📡 Detection & Monitoring
Log Indicators:
- Unusual file modification events in Windows Event Logs (Security/System), particularly in system directories by non-administrative users.
- Tenable Agent service restart or unexpected behavior logs.
Network Indicators:
- No specific network indicators as this is a local vulnerability.
SIEM Query:
EventID=4663 OR EventID=4656 AND ObjectName LIKE '%\system32\%' AND SubjectUserName NOT IN (admin_users_list)