CVE-2026-2026: CWE-276 Incorrect Default Permissions in Tenable Agent
A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.
AI Analysis
Technical Summary
CVE-2026-2026 identifies a security vulnerability in the Tenable Nessus Agent version 11.1.0 for Windows platforms, categorized under CWE-276 (Incorrect Default Permissions). The issue arises from weak default NTFS permissions set on the agent’s installation directory, which may allow users with low privileges on the host system to access or modify files they should not be able to. This improper permission configuration can be exploited to cause Denial of Service (DoS) attacks by interfering with the agent’s operation, potentially disrupting vulnerability scanning and reporting. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction or elevated privileges. The CVSS 4.0 vector indicates low attack complexity and no need for authentication, but the impact on confidentiality and integrity is low, while availability impact is high. The agent is a critical component in vulnerability management workflows, so disruption can degrade an organization’s security monitoring capabilities. No public exploits are known, and no patches have been linked yet, emphasizing the need for proactive permission audits and controls. The vulnerability was published on February 13, 2026, and affects Windows hosts running the specified agent version.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of vulnerability management processes. Disruption of the Tenable Agent could delay or prevent timely vulnerability detection and remediation, increasing exposure to other threats. Organizations relying heavily on automated vulnerability scanning and compliance monitoring may experience operational impacts. Since the vulnerability requires local access, insider threats or attackers who have gained limited footholds on endpoints could exploit this to escalate disruption. Critical infrastructure sectors, financial institutions, and large enterprises with extensive Windows endpoint deployments are particularly at risk. The impact is compounded in environments with less stringent endpoint security controls or where agent permissions have not been reviewed. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but warrants attention to prevent potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit NTFS permissions on the Tenable Agent installation directories on all Windows hosts to ensure only authorized system accounts (e.g., SYSTEM, Administrators) have access. Remove or restrict permissions granted to standard users or groups that do not require access. Implement endpoint security controls to limit local user privileges and monitor for unauthorized permission changes. Apply the principle of least privilege rigorously on all endpoints. Monitor Tenable’s advisories for patches or updated agent versions addressing this issue and plan prompt deployment once available. Additionally, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous file access or modifications within the agent directory. Regularly review and harden endpoint configurations as part of vulnerability management hygiene. Finally, educate IT and security teams about the risks of weak file permissions and the importance of securing agent software.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2026-2026: CWE-276 Incorrect Default Permissions in Tenable Agent
Description
A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-2026 identifies a security vulnerability in the Tenable Nessus Agent version 11.1.0 for Windows platforms, categorized under CWE-276 (Incorrect Default Permissions). The issue arises from weak default NTFS permissions set on the agent’s installation directory, which may allow users with low privileges on the host system to access or modify files they should not be able to. This improper permission configuration can be exploited to cause Denial of Service (DoS) attacks by interfering with the agent’s operation, potentially disrupting vulnerability scanning and reporting. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction or elevated privileges. The CVSS 4.0 vector indicates low attack complexity and no need for authentication, but the impact on confidentiality and integrity is low, while availability impact is high. The agent is a critical component in vulnerability management workflows, so disruption can degrade an organization’s security monitoring capabilities. No public exploits are known, and no patches have been linked yet, emphasizing the need for proactive permission audits and controls. The vulnerability was published on February 13, 2026, and affects Windows hosts running the specified agent version.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of vulnerability management processes. Disruption of the Tenable Agent could delay or prevent timely vulnerability detection and remediation, increasing exposure to other threats. Organizations relying heavily on automated vulnerability scanning and compliance monitoring may experience operational impacts. Since the vulnerability requires local access, insider threats or attackers who have gained limited footholds on endpoints could exploit this to escalate disruption. Critical infrastructure sectors, financial institutions, and large enterprises with extensive Windows endpoint deployments are particularly at risk. The impact is compounded in environments with less stringent endpoint security controls or where agent permissions have not been reviewed. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but warrants attention to prevent potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit NTFS permissions on the Tenable Agent installation directories on all Windows hosts to ensure only authorized system accounts (e.g., SYSTEM, Administrators) have access. Remove or restrict permissions granted to standard users or groups that do not require access. Implement endpoint security controls to limit local user privileges and monitor for unauthorized permission changes. Apply the principle of least privilege rigorously on all endpoints. Monitor Tenable’s advisories for patches or updated agent versions addressing this issue and plan prompt deployment once available. Additionally, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous file access or modifications within the agent directory. Regularly review and harden endpoint configurations as part of vulnerability management hygiene. Finally, educate IT and security teams about the risks of weak file permissions and the importance of securing agent software.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- tenable
- Date Reserved
- 2026-02-05T21:05:54.081Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698f5286c9e1ff5ad84a5d3b
Added to database: 2/13/2026, 4:34:14 PM
Last enriched: 2/13/2026, 4:48:31 PM
Last updated: 2/13/2026, 7:19:28 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26208: CWE-502: Deserialization of Untrusted Data in Alex4SSB ADB-Explorer
HighCVE-2026-26190: CWE-306: Missing Authentication for Critical Function in milvus-io milvus
CriticalCVE-2026-2441: Use after free in Google Chrome
HighCVE-2026-26187: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in treeverse lakeFS
HighCVE-2026-25991: CWE-918: Server-Side Request Forgery (SSRF) in TandoorRecipes recipes
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.