Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Agent 10.8.5 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/nessus-agents
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18396 | In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege. |
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2025-11 |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Tenable Tenable nessus Agent |
|
| CPEs | cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Tenable Tenable nessus Agent |
Mon, 16 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege. | |
| Title | Local Privilege Escalation | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-06-16T14:19:22.891Z
Reserved: 2025-04-15T21:50:46.277Z
Link: CVE-2025-36632
Updated: 2025-06-16T14:19:14.312Z
Status : Analyzed
Published: 2025-06-16T14:15:21.870
Modified: 2025-10-21T20:19:43.853
Link: CVE-2025-36632
No data.
OpenCVE Enrichment
No data.
EUVD