Tenable Security Updates – 19 May 2024

Tenable has released Nessus version “10.7.3” and Nessus Agent version “10.6.4” to address multiple vulnerabilities.

The addressed vulnerabilities could allow the attacker to gain elevated privilege or execute arbitrary code and gain access on the affected system.

Sample of the addressed vulnerabilities:

1. Tenable Nessus Code Execution vulnerability (CVE-2024-3290):

  • CVSS: 8.2
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Consequences: Gain Access

2. Tenable Nessus Agent Privilege Escalation Vulnerability (CVE-2024-3291):

  • CVSS: 7.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Privilege Escalation
Vulnerabilities
  • CVE-2024-3289
  • CVE-2024-3290
  • CVE-2024-3291
  • CVE-2024-3292
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Tenable Security Advisory

References