Go offline with the Player FM app!
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
Manage episode 489095594 series 3645080
In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows.
We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a non-administrative user to gain SYSTEM-level access, execute arbitrary code, delete critical files, or overwrite system content. These vulnerabilities, patched in version 10.8.5 of Nessus Agent, represent a textbook example of how privilege escalation paves the way for arbitrary code execution (ACE) and potential ransomware deployment.
In the second half of the episode, we unpack:
🛠️ What privilege escalation is, including vertical and horizontal types
📊 Real-world exploitation paths on Windows systems
🔐 Why tools like BloodHound, winPEAS, and PowerUp are favorites among threat actors
📉 The security impact of misconfigured services, overprivileged accounts, and weak registry settings
✅ And most importantly: what your organization can do to detect, prevent, and mitigate privilege escalation attacks before they spiral out of control
With privilege escalation playing a central role in everything from data breaches to ransomware infections, this episode is a must-listen for IT admins, security professionals, and anyone responsible for hardening their organization’s defenses.
🔄 Don't forget to patch your Nessus Agents, enforce least privilege, and audit your environments regularly.
141 episodes
Manage episode 489095594 series 3645080
In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows.
We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a non-administrative user to gain SYSTEM-level access, execute arbitrary code, delete critical files, or overwrite system content. These vulnerabilities, patched in version 10.8.5 of Nessus Agent, represent a textbook example of how privilege escalation paves the way for arbitrary code execution (ACE) and potential ransomware deployment.
In the second half of the episode, we unpack:
🛠️ What privilege escalation is, including vertical and horizontal types
📊 Real-world exploitation paths on Windows systems
🔐 Why tools like BloodHound, winPEAS, and PowerUp are favorites among threat actors
📉 The security impact of misconfigured services, overprivileged accounts, and weak registry settings
✅ And most importantly: what your organization can do to detect, prevent, and mitigate privilege escalation attacks before they spiral out of control
With privilege escalation playing a central role in everything from data breaches to ransomware infections, this episode is a must-listen for IT admins, security professionals, and anyone responsible for hardening their organization’s defenses.
🔄 Don't forget to patch your Nessus Agents, enforce least privilege, and audit your environments regularly.
141 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.