CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Description
In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation.
Analysis
Local privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to arbitrarily delete system files with SYSTEM privileges. This vulnerability has a CVSS score of 8.8 (High) and could enable local attackers to compromise system integrity and gain elevated privileges. The attack requires local access but no user interaction, making it a significant risk for multi-user Windows systems running vulnerable Tenable Agent versions.
Technical Context
The vulnerability stems from improper privilege management and insufficient access controls within Tenable Agent (CPE: cpe:2.3:a:tenable:tenable_agent:*:*:*:*:*:windows:*:*). The root cause is classified under CWE-269 (Improper Access Control - Assuming Trust Without Validation), which indicates the application fails to properly validate user privileges before performing file operations with elevated system context. Tenable Agent runs as a system service on Windows hosts and interacts with the file system; the flaw allows a non-administrative user to leverage this elevated process context to delete arbitrary system files, bypassing normal Windows access control mechanisms and potentially disabling security controls or corrupting system functionality.
Affected Products
Tenable Agent (Prior to 10.8.5)
Remediation
Upgrade Tenable Agent to version 10.8.5 or later on all affected Windows hosts; priority: Critical; vendor_advisory: Tenable advisory for CVE-2025-36633 (consult Tenable Security Center or vendor website for official patch links) Workaround: Restrict local system access to trusted users only; implement principle of least privilege for user accounts on systems running Tenable Agent; effectiveness: Partial - reduces attack surface by limiting local access but does not fix underlying vulnerability Mitigation: Monitor and restrict file deletion operations performed by Tenable Agent process; implement application whitelisting to prevent execution of unauthorized file deletion utilities; maintain Windows file system auditing for privileged file deletion events; effectiveness: Partial - detective controls do not prevent exploitation but improve incident response capability Detection: Monitor Windows event logs for file deletion events with SYSTEM privilege context from non-administrative sessions; alert on unexpected modifications to critical system directories; effectiveness: Partial - post-exploitation detection
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18279