Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36640: CWE-269 Improper Privilege Management in Tenable Nessus Agent

0
High
VulnerabilityCVE-2025-36640cvecve-2025-36640cwe-269
Published: Tue Jan 13 2026 (01/13/2026, 15:05:19 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Nessus Agent

Description

A vulnerability has been identified in the installation/uninstallation of the Nessus Agent Tray App on Windows Hosts which could lead to escalation of privileges.

AI-Powered Analysis

AILast updated: 01/13/2026, 15:41:05 UTC

Technical Analysis

CVE-2025-36640 is a vulnerability classified under CWE-269 (Improper Privilege Management) affecting the Tenable Nessus Agent Tray App on Windows hosts. The flaw exists in the installation and uninstallation processes of the Tray App, which can be exploited by an attacker who already has limited privileges (low-level privileges) on the system to escalate their privileges to a higher level. This escalation could allow the attacker to execute code or perform actions with elevated rights, potentially compromising the system's confidentiality, integrity, and availability. The CVSS v4.0 score of 7.3 reflects a high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), and requiring privileges (PR:L) but no user interaction (UI:N). The vulnerability impacts multiple security properties (VC:H, VI:H, VA:H) and has a high scope (S:H), indicating that the exploit could affect resources beyond the initially compromised component. The affected versions include all Nessus Agent versions up to 11.0.0. Although no public exploits have been reported yet, the nature of the vulnerability suggests that it could be leveraged in targeted attacks or insider threat scenarios. The vulnerability was reserved in April 2025 and published in January 2026, indicating a recent disclosure. The lack of available patches at the time of reporting necessitates immediate mitigation steps to reduce exposure. Given the widespread use of Tenable Nessus Agent in enterprise environments for vulnerability management, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-36640 could be substantial, especially for those relying heavily on Tenable Nessus Agent for vulnerability scanning and security posture management. Successful exploitation could allow attackers to gain elevated privileges on Windows hosts, potentially leading to unauthorized access to sensitive data, disruption of security monitoring capabilities, and lateral movement within networks. This could undermine the integrity of security operations and increase the risk of further compromise. Critical infrastructure sectors such as finance, energy, healthcare, and government agencies in Europe are particularly at risk due to their reliance on robust vulnerability management tools and the sensitive nature of their data. The high severity and scope of the vulnerability mean that even a single exploited host could compromise broader network segments. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection, and a breach facilitated by this vulnerability could lead to significant legal and financial consequences. The absence of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization remains a concern.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting local access to systems running the Nessus Agent Tray App, ensuring that only trusted administrators have the necessary privileges to install or uninstall software. 2. Implement strict role-based access controls (RBAC) and limit the use of privileged accounts on affected Windows hosts. 3. Monitor logs and system events for unusual installation or uninstallation activities related to the Nessus Agent Tray App. 4. Employ application whitelisting to prevent unauthorized execution of installation or uninstallation binaries. 5. Until a patch is released, consider temporarily disabling the Nessus Agent Tray App where feasible or isolating affected systems from critical network segments. 6. Stay informed on Tenable’s advisories and apply patches immediately once available. 7. Conduct internal audits to identify all systems running vulnerable versions and prioritize them for remediation. 8. Enhance endpoint detection and response (EDR) capabilities to detect privilege escalation attempts. 9. Educate IT staff about the vulnerability and the importance of maintaining least privilege principles. 10. Review and update incident response plans to include scenarios involving local privilege escalation via security tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2025-04-15T21:51:04.822Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69666427a60475309f6cdbe7

Added to database: 1/13/2026, 3:26:31 PM

Last enriched: 1/13/2026, 3:41:05 PM

Last updated: 1/13/2026, 6:51:41 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats