Tenable Nessus < 7.0.3 Sub-directory Missing Secure Permission Local Privilege Escalation (TNS-2018-01)

Medium Nessus Plugin ID 108689


An application running on the remote host is affected by a local privilege escalation vulnerability.


According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.0.3. It is, therefore, affected by a local privilege escalation vulnerability due to the program failing to enforce secure permissions for sub-directories when a directory is installed outside of the default location.

This plugin is only checking the remote version and has not checked for installation location.


Upgrade to Tenable Nessus version 7.0.3 or later.

See Also


Plugin Details

Severity: Medium

ID: 108689

File Name: nessus_tns_2018_01.nasl

Version: 1.4

Type: remote

Agent: windows

Family: Windows

Published: 2018/03/28

Updated: 2018/11/15

Dependencies: 10147

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:tenable:nessus

Required KB Items: installed_sw/nessus, Settings/ParanoidReport

Patch Publication Date: 2018/03/14

Vulnerability Publication Date: 2018/03/19

Reference Information

CVE: CVE-2018-1141