Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2026: CWE-276 Incorrect Default Permissions in Tenable Agent

0
Medium
VulnerabilityCVE-2026-2026cvecve-2026-2026cwe-276
Published: Fri Feb 13 2026 (02/13/2026, 16:14:23 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Agent

Description

A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.

AI-Powered Analysis

AILast updated: 02/13/2026, 16:48:31 UTC

Technical Analysis

CVE-2026-2026 identifies a security vulnerability in the Tenable Nessus Agent version 11.1.0 for Windows platforms, categorized under CWE-276 (Incorrect Default Permissions). The issue arises from weak default NTFS permissions set on the agent’s installation directory, which may allow users with low privileges on the host system to access or modify files they should not be able to. This improper permission configuration can be exploited to cause Denial of Service (DoS) attacks by interfering with the agent’s operation, potentially disrupting vulnerability scanning and reporting. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction or elevated privileges. The CVSS 4.0 vector indicates low attack complexity and no need for authentication, but the impact on confidentiality and integrity is low, while availability impact is high. The agent is a critical component in vulnerability management workflows, so disruption can degrade an organization’s security monitoring capabilities. No public exploits are known, and no patches have been linked yet, emphasizing the need for proactive permission audits and controls. The vulnerability was published on February 13, 2026, and affects Windows hosts running the specified agent version.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of vulnerability management processes. Disruption of the Tenable Agent could delay or prevent timely vulnerability detection and remediation, increasing exposure to other threats. Organizations relying heavily on automated vulnerability scanning and compliance monitoring may experience operational impacts. Since the vulnerability requires local access, insider threats or attackers who have gained limited footholds on endpoints could exploit this to escalate disruption. Critical infrastructure sectors, financial institutions, and large enterprises with extensive Windows endpoint deployments are particularly at risk. The impact is compounded in environments with less stringent endpoint security controls or where agent permissions have not been reviewed. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but warrants attention to prevent potential escalation or chaining with other vulnerabilities.

Mitigation Recommendations

European organizations should immediately audit NTFS permissions on the Tenable Agent installation directories on all Windows hosts to ensure only authorized system accounts (e.g., SYSTEM, Administrators) have access. Remove or restrict permissions granted to standard users or groups that do not require access. Implement endpoint security controls to limit local user privileges and monitor for unauthorized permission changes. Apply the principle of least privilege rigorously on all endpoints. Monitor Tenable’s advisories for patches or updated agent versions addressing this issue and plan prompt deployment once available. Additionally, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous file access or modifications within the agent directory. Regularly review and harden endpoint configurations as part of vulnerability management hygiene. Finally, educate IT and security teams about the risks of weak file permissions and the importance of securing agent software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-02-05T21:05:54.081Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698f5286c9e1ff5ad84a5d3b

Added to database: 2/13/2026, 4:34:14 PM

Last enriched: 2/13/2026, 4:48:31 PM

Last updated: 2/13/2026, 7:19:28 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats