Source: Cyber Security News
Author: Guru Baran
URL: https://cybersecuritynews.com/nessus-agent-vulnerability-on-windows/
ONE SENTENCE SUMMARY:
A Windows Nessus Agent junction abuse flaw enables SYSTEM-level file deletion, escalating to code execution, patched in version 11.1.3.
MAIN POINTS:
- Newly disclosed Nessus Agent for Windows bug enables SYSTEM-level privilege escalation.
- Attackers can abuse NTFS junctions to redirect privileged filesystem operations.
- Flaw permits arbitrary file deletion performed by the Nessus Agent service.
- Controlled deletion can cascade into full arbitrary code execution as SYSTEM.
- Exploitation requires local access to plant a malicious junction.
- Unvalidated junction following during deletion routines causes unintended target manipulation.
- SYSTEM context enables disabling security tools, installing rootkits, and persistent compromise.
- Enterprises running agents on sensitive endpoints face severe downstream impact.
- Tenable fixed the issue in Nessus Agent version 11.1.3.
- Immediate upgrading via Tenable Downloads Portal is strongly recommended.
TAKEAWAYS:
- Prioritize patching Nessus Agent on Windows endpoints, especially high-value or exposed systems.
- Treat junction/symlink attacks as critical whenever privileged services touch user-influenced paths.
- Limit local attacker opportunities by hardening endpoints and restricting write access to agent directories.
- Validate privileged file operations against reparse points to prevent unintended redirections.
- Maintain coordinated disclosure channels with vendors to accelerate remediation and reduce exposure.