A newly identified security flaw in Tenable’s Nessus Agent for Windows poses a significant threat. This vulnerability allows attackers to run harmful code with top-level system privileges, which is alarming for organizations that rely on this popular vulnerability assessment tool.
So, what exactly is the issue? Attackers can create a Windows junction, a special type of link to a different file location. This gives them the ability to delete critical files, which could lead to complete control over the infected machine.
The problem stems from a type of security weakness known as a “symlink attack.” On Windows, NTFS junctions can redirect file operations. If the Nessus Agent, a process with high privileges, follows a junction without proper checks, it might act on targets that the attacker chooses.
If an attacker has local access, they can place a malicious junction where the Nessus Agent operates. This could misdirect the agent’s file deletion routine to vital system files, allowing the attacker to corrupt the system and execute harmful programs with full privileges.
This is particularly dangerous. The SYSTEM level in Windows holds the highest privileges, even above administrator accounts. Malware running as SYSTEM can make any changes it wants, including installing rootkits and disabling security measures, and it can persist even after reboots.
Currently, this vulnerability impacts Nessus Agent installations on Windows. Organizations using Nessus for vulnerability scanning are at risk. Since these agents often sit on sensitive servers and workstations, a successful attack could drastically weaken an organization’s security.
Tenable has released an update to fix this issue in Nessus Agent version 11.1.3. They urge all users to update immediately. Timely application of this patch is crucial to keep systems safe.
Tenable emphasizes their commitment to responsibly disclosing security issues. They encourage security teams to share any new vulnerabilities they discover, which helps with rapid patching.
In light of this serious vulnerability, security administrators should prioritize updates, especially in environments where Nessus Agents are operational on critical or publicly accessible Windows systems.
In terms of broader implications, recent data from Cybersecurity Ventures reveals that cybercrime is projected to cost the world $10.5 trillion annually by 2025. This highlights the increasing urgency for organizations to maintain strong cybersecurity defenses, especially when dealing with high-risk software like Nessus Agent.
By staying informed and proactive about updates, organizations can better protect themselves from such vulnerabilities.
Source link

