These vulnerabilities, tracked as CVE-2025-36630, CVE-2025-6021, and CVE-2025-24855, affect Nessus versions 10.8.4 and earlier and have prompted urgent recommendations for users to update their deployments immediately.
The newly patched vulnerabilities include:
AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C.Tenable responded by updating critical third-party libraries: libxml2 to version 2.13.8 and libxslt to version 1.1.43, mitigating the identified risks.
To address these vulnerabilities, Tenable has released both Nessus 10.8.5 and Nessus 10.9.0. Users are strongly advised to download and install the latest versions from the Tenable Downloads Portal.
The update process can be performed from any previously supported version, and administrators are encouraged to review release notes for additional enhancements and bug fixes.
Key commands for managing Nessus updates include:
bash# Update Nessus to the latest version
sudo /opt/nessus/sbin/nessuscli update
# Optimize configuration database (Nessus 10.9.0+)
sudo /opt/nessus/sbin/nessuscli system --config-optimization
Tenable also recommends enabling Early Access releases in the Nessus Update Plan for the timely adoption of security patches.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Nessus Windows Vulnerability Allows Overwrite of Arbitrary Local System Files appeared first on Cyber Security News.
The Pokémon Company technical director Masaaki Hoshino has acknowledged continued fan scrutiny of the series'…
John Wick 5 just got a positive update that suggests the movie will be made…
When we think of modern architecture, we often think first of what’s called the International…
This month big tech companies have been dominating the AI news cycle on a number…
Nowadays, people expect instant access to bookings, communication, and maps the moment they land in…
Your embeddings are solid. Your vector database is tuned. Your LLM is capable. So why…
This website uses cookies.