Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24915: CWE-276: Incorrect Default Permissions in Tenable Nessus Agent

0
High
VulnerabilityCVE-2025-24915cvecve-2025-24915cwe-276
Published: Fri Mar 21 2025 (03/21/2025, 14:13:35 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Nessus Agent

Description

CVE-2025-24915 is a high-severity vulnerability in Tenable Nessus Agent versions prior to 10. 8. 3 on Windows systems when installed to a non-default directory. The issue arises from incorrect default permissions (CWE-276) on sub-directories within the non-default installation path, potentially allowing local users with limited privileges to escalate their rights. Exploitation requires local access but no user interaction, and can lead to full compromise of confidentiality, integrity, and availability of the affected system. No known exploits are currently reported in the wild. Organizations using Nessus Agent on Windows should verify installation paths and permissions, and upgrade to version 10. 8. 3 or later. This vulnerability primarily affects environments where Nessus Agent is deployed on Windows hosts, especially in enterprises relying on Tenable’s vulnerability management solutions.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:14:11 UTC

Technical Analysis

CVE-2025-24915 identifies a local privilege escalation vulnerability in Tenable Nessus Agent for Windows when installed to a non-default directory. The root cause is improper default permissions (CWE-276) assigned to sub-directories under the custom installation path, which fail to restrict access adequately. This misconfiguration can allow local users with limited privileges to modify or replace files within these directories, thereby escalating their privileges to higher levels, potentially SYSTEM or Administrator. The vulnerability affects all Nessus Agent versions prior to 10.8.3. Exploitation requires local access and no user interaction, making it a straightforward attack vector for insiders or compromised low-privilege accounts. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution or system modification. Although no public exploits are known, the high CVSS score (7.8) indicates a significant risk, especially in environments where Nessus Agent is deployed on Windows endpoints with non-standard installation paths. The issue was reserved in January 2025 and published in March 2025, with Tenable addressing it in version 10.8.3. Organizations using Nessus Agent should audit installation directories, verify permissions, and apply the patch promptly to mitigate the risk.

Potential Impact

This vulnerability allows local attackers to escalate privileges on Windows hosts running Nessus Agent installed in non-default locations. The impact includes potential full system compromise, unauthorized access to sensitive data, and disruption of security monitoring functions provided by Nessus Agent. Attackers gaining elevated privileges could disable security controls, install persistent malware, or move laterally within the network. Enterprises relying on Nessus for vulnerability management and compliance monitoring may face increased risk of undetected intrusions or data breaches. The vulnerability undermines the integrity and availability of the affected systems and can lead to significant operational and reputational damage. Since exploitation requires local access, the threat is most severe in environments with multiple users or where endpoint security is lax. The absence of known exploits in the wild reduces immediate risk but does not diminish the urgency for remediation given the ease of exploitation once local access is obtained.

Mitigation Recommendations

1. Upgrade Nessus Agent to version 10.8.3 or later, where this vulnerability is fixed. 2. Audit all Windows hosts with Nessus Agent installed in non-default directories to verify and correct directory and sub-directory permissions, ensuring they follow the principle of least privilege. 3. Restrict local user permissions on endpoints to prevent unauthorized directory modifications. 4. Implement endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation attempts. 5. Enforce strict access controls and user account management to minimize the number of users with local access. 6. Regularly review and harden installation procedures to avoid non-default paths unless necessary, and document permission requirements. 7. Conduct internal penetration testing focusing on local privilege escalation vectors to identify similar misconfigurations. 8. Educate system administrators and security teams about the risks of improper directory permissions and the importance of patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2025-01-28T20:09:40.193Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45985912abc71d662b0

Added to database: 2/26/2026, 7:51:53 PM

Last enriched: 2/26/2026, 8:14:11 PM

Last updated: 2/26/2026, 10:49:43 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses