First published: Fri May 17 2024(Updated: )
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus Agent host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host. - CVE-2024-3292
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nessus Agent |
Tenable has released Nessus Agent 10.6.4 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-agents ).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3292 has been assigned a high severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2024-3292, update the Tenable Nessus Agent to the latest version provided by Tenable.
CVE-2024-3292 affects authenticated users on systems running the Tenable Nessus Agent.
CVE-2024-3292 cannot be exploited remotely as it requires local access to the affected system.
Exploitation of CVE-2024-3292 could lead to unauthorized execution of arbitrary code, compromising system integrity.