First published: Fri May 17 2024(Updated: )
When installing Nessus Agent to a directory outside of the default location on a Windows host, Nessus Agent versions prior to 10.6.4 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nessus Agent | <10.6.4 |
Tenable has released Nessus Agent 10.6.4 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-agents ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3291 is classified as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2024-3291, upgrade the Nessus Agent to version 10.6.4 or later, ensuring that secure permissions are enforced on directory installation.
Nessus Agent versions prior to 10.6.4 are affected by CVE-2024-3291.
CVE-2024-3291 can lead to local privilege escalation, allowing unauthorized users to gain elevated access to the system.
You can verify vulnerability to CVE-2024-3291 by checking the version of your Nessus Agent and its installation directory permissions.