First published: Fri May 17 2024(Updated: )
When installing Nessus to a directory outside of the default location on a Windows host, Nessus versions prior to 10.7.3 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus Amazon Machine Image | <10.7.3 |
Tenable has released Nessus 10.7.3 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3289 is considered a high severity vulnerability due to the potential for local privilege escalation on affected systems.
To fix CVE-2024-3289, upgrade Nessus to version 10.7.3 or later which enforces secure permissions for non-default installation directories.
CVE-2024-3289 affects Nessus versions prior to 10.7.3.
No, CVE-2024-3289 can only be exploited locally by users who have access to the non-default installation directories.
For CVE-2024-3289 to pose a risk, users must have not secured permissions on the sub-directories of the non-default installation location.