First published: Fri Apr 18 2025(Updated: )
In Nessus versions prior to 10.8.4, a non-authenticated attacker could alter Nessus logging entries by manipulating http requests to the application.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nessus | <10.8.4 |
Tenable has released Nessus 10.8.4 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/nessus https://www.tenable.com/downloads/nessus
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-36625 is classified as a moderate severity vulnerability.
CVE-2025-36625 allows a non-authenticated attacker to manipulate logging entries by altering HTTP requests.
Nessus versions prior to 10.8.4 are affected by CVE-2025-36625.
To mitigate CVE-2025-36625, update Tenable Nessus to version 10.8.4 or later.
Yes, CVE-2025-36625 can be exploited remotely by a non-authenticated attacker.