Home Tenable CVE-2025-24915
Back to Tenable

CVE-2025-24915

Target: Nessus Agent

Tenable CVSS 7.8 Updated March 10, 2026
Threat Level HIGH

Executive Risk Summary

"A vulnerability in Nessus Agent versions prior to 10.8.3 allows for local privilege escalation when installed to a non-default location on a Windows host. This is due to the lack of secure permissions enforcement for sub-directories, which could be exploited if users have not secured the directories in the non-default installation location."

Operational Audit Arsenal

Target Type Software
Target Asset Nessus Agent
Standard Path Non-default installation location on Windows host
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Nessus Agent (Software)
$Target = "Nessus Agent"
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Filter $Target -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unknown
Service Disruption

Low to Moderate

Internal Work Notes

Upgrade Nessus Agent to version 10.8.3 or later to mitigate the vulnerability. Ensure secure permissions are enforced for sub-directories in non-default installation locations.

Intelligence Sources

Scope of Impact

Original NVD Description

"When installing Nessus Agent to a non-default location on a Windows host, Nessus Agent versions prior to 10.8.3 did not enforce secure permissions for sub-directories.  This could allow for local privilege escalation if users had not secured the directories in the non-default installation location."

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.