Rewterz

7 Million WordPress Sites at Risk Due to Plugin XSS Flaw

April 24, 2026
Rewterz

OilRig Hides C2 in Google Drive Image via LSB – Active IOCs

April 28, 2026

Nessus Agent Windows Flaw Enables SYSTEM Code Execution

Severity

High

Analysis Summary

A newly disclosed vulnerability in Tenable’s Nessus Agent for Windows has raised significant security concerns due to its potential to enable attackers to gain SYSTEM-level privileges. The issue stems from improper handling of Windows NTFS junctions (a type of symbolic link). If exploited, a local attacker can manipulate how the Nessus Agent processes file operations, causing it to interact with unintended or sensitive system paths.

The core of the vulnerability lies in a “junction abuse” or symlink attack scenario. An attacker with local access can create a malicious directory junction that redirects the agent’s file deletion or processing actions. Because the Nessus Agent service runs with elevated privileges, it may unknowingly follow this redirection and perform operations on critical system files. This can result in arbitrary file deletion and system corruption under SYSTEM privileges.

Once arbitrary file deletion is achieved at the SYSTEM level, the attack can escalate further into full code execution. This means an attacker could potentially place and execute malicious payloads that inherit SYSTEM privileges, giving them complete control over the compromised machine. At this level, they can disable security tools, install persistent malware, and maintain long-term unauthorized access without detection.

The vulnerability impacts Windows-based deployments of Nessus Agent, commonly used in enterprise environments for continuous vulnerability scanning. Because these agents are often installed on high-value servers and endpoints, the risk is considered severe. Tenable has released a fix in Nessus Agent version 11.1.3 and strongly recommends immediate patching. Organizations are advised to prioritize updates to reduce exposure and prevent potential exploitation in production environments.

Impact

  • Privilege Escalation
  • Code Execution
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2026-33694

Remediation

  • Upgrade Nessus Agent to version 11.1.3 or later immediately, as this release contains the official patch for the vulnerability.
  • Avoid running Nessus Agent on unnecessarily high-value or internet-exposed systems unless required for operations.
  • Restrict local user access on systems where Nessus Agent is installed to reduce the chance of an attacker creating malicious junctions.
  • Monitor and audit file system changes, especially unusual NTFS junction or symbolic link creation in directories used by security tools.
  • Enforce strict permissions on directories accessed by Nessus Agent to prevent unauthorized modification or redirection.
  • Enable endpoint detection and response (EDR) tools to detect suspicious privilege escalation or SYSTEM-level activity.
  • Regularly review and harden service configurations to ensure Nessus Agent does not interact with untrusted file paths.