Categories: Cyber Security News

Nessus Windows Vulnerability Allows Overwrite of Arbitrary Local System Files

Tenable, a leading cybersecurity provider, has released Nessus version 10.8.5, addressing several high-severity vulnerabilities that could allow attackers to escalate privileges, execute code, and overwrite system files on Windows hosts.

These vulnerabilities, tracked as CVE-2025-36630, CVE-2025-6021, and CVE-2025-24855, affect Nessus versions 10.8.4 and earlier and have prompted urgent recommendations for users to update their deployments immediately.

Vulnerabilities and CVSS Scores

The newly patched vulnerabilities include:

  • CVE-2025-36630: An improper privilege management flaw allowed a non-administrative user to overwrite arbitrary local system files with log content at SYSTEM privilege. This vulnerability carries a CVSSv3 base score of 8.4, indicating a high risk, and is described by the vector AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C.
  • CVE-2025-6021: Addressed by backporting a fix to libxml2 v2.13.8, this vulnerability had a CVSSv3 base score of 6.5 and was related to third-party component exposure.
  • CVE-2025-24855: Another high-severity issue, scored at 7.8, involved potential privilege escalation and code execution via the Nessus Agent on Windows hosts.

Tenable responded by updating critical third-party libraries: libxml2 to version 2.13.8 and libxslt to version 1.1.43, mitigating the identified risks.

Remediation Steps and Update Procedures

To address these vulnerabilities, Tenable has released both Nessus 10.8.5 and Nessus 10.9.0. Users are strongly advised to download and install the latest versions from the Tenable Downloads Portal.

The update process can be performed from any previously supported version, and administrators are encouraged to review release notes for additional enhancements and bug fixes.

Key commands for managing Nessus updates include:

bash# Update Nessus to the latest version
sudo /opt/nessus/sbin/nessuscli update

# Optimize configuration database (Nessus 10.9.0+)
sudo /opt/nessus/sbin/nessuscli system --config-optimization

Tenable also recommends enabling Early Access releases in the Nessus Update Plan for the timely adoption of security patches.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Nessus Windows Vulnerability Allows Overwrite of Arbitrary Local System Files appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Pokémon Champions Producer Acknowledges Visual ‘Limitations’ Amid Ongoing Fan Scrutiny of Series’ Graphics

The Pokémon Company technical director Masaaki Hoshino has acknowledged continued fan scrutiny of the series'…

56 minutes ago

John Wick 5 Gets First Positive Update in a Year

John Wick 5 just got a positive update that suggests the movie will be made…

57 minutes ago

When Brazil Built Its Capital on Modernist Principles: The Controversial Design of Brasília

When we think of modern architecture, we often think first of what’s called the International…

2 hours ago

Meta experiments with AI internally, Musk and Altman head to court, and startups continue to innovate in April

This month big tech companies have been dominating the AI news cycle on a number…

2 hours ago

How AI eSIM Is Redefining International Connectivity

Nowadays, people expect instant access to bookings, communication, and maps the moment they land in…

2 hours ago

The #1 Reason Your AI RAG Pipeline Gives Wrong Answers: Bad Document Labeling

Your embeddings are solid. Your vector database is tuned. Your LLM is capable. So why…

2 hours ago

This website uses cookies.