Tenable

Nessus Agent

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.06.2025 13:56:23
  • Zuletzt bearbeitet 21.10.2025 20:19:43

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege.

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 13.06.2025 14:34:52
  • Zuletzt bearbeitet 23.10.2025 16:00:08

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

Medienbericht
  • EPSS 0.01%
  • Veröffentlicht 13.06.2025 14:21:04
  • Zuletzt bearbeitet 23.10.2025 16:00:44

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation.

  • EPSS 0.01%
  • Veröffentlicht 21.03.2025 14:13:35
  • Zuletzt bearbeitet 21.03.2025 15:15:42

When installing Nessus Agent to a non-default location on a Windows host, Nessus Agent versions prior to 10.8.3 did not enforce secure permissions for sub-directories.  This could allow for local privilege escalation if users had not secured the dire...

  • EPSS 0.04%
  • Veröffentlicht 17.05.2024 18:15:07
  • Zuletzt bearbeitet 21.11.2024 09:29:20

A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus Agent host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host. - CVE-2024-...

  • EPSS 0.04%
  • Veröffentlicht 17.05.2024 17:15:07
  • Zuletzt bearbeitet 21.11.2024 09:29:20

When installing Nessus Agent to a directory outside of the default location on a Windows host, Nessus Agent versions prior to 10.6.4 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had ...

  • EPSS 0.07%
  • Veröffentlicht 18.03.2024 16:15:09
  • Zuletzt bearbeitet 21.11.2024 09:09:39

As a part of Tenable’s vulnerability disclosure program, a vulnerability in a Nessus plugin was identified and reported. This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific fi...

  • EPSS 0.05%
  • Veröffentlicht 01.11.2023 16:15:08
  • Zuletzt bearbeitet 21.11.2024 08:42:37

Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.

  • EPSS 0.04%
  • Veröffentlicht 09.09.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 05:45:57

Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20117.

  • EPSS 0.04%
  • Veröffentlicht 09.09.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:45:57

Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118.