EUVD-2025-18279

| CVE-2025-36633 HIGH
2025-06-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2025-18279
CVE Published
Jun 13, 2025 - 15:15 nvd
HIGH 8.8

Description

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation.

Analysis

Local privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to arbitrarily delete system files with SYSTEM privileges. This vulnerability has a CVSS score of 8.8 (High) and could enable local attackers to compromise system integrity and gain elevated privileges. The attack requires local access but no user interaction, making it a significant risk for multi-user Windows systems running vulnerable Tenable Agent versions.

Technical Context

The vulnerability stems from improper privilege management and insufficient access controls within Tenable Agent (CPE: cpe:2.3:a:tenable:tenable_agent:*:*:*:*:*:windows:*:*). The root cause is classified under CWE-269 (Improper Access Control - Assuming Trust Without Validation), which indicates the application fails to properly validate user privileges before performing file operations with elevated system context. Tenable Agent runs as a system service on Windows hosts and interacts with the file system; the flaw allows a non-administrative user to leverage this elevated process context to delete arbitrary system files, bypassing normal Windows access control mechanisms and potentially disabling security controls or corrupting system functionality.

Affected Products

Tenable Agent (Prior to 10.8.5)

Remediation

Upgrade Tenable Agent to version 10.8.5 or later on all affected Windows hosts; priority: Critical; vendor_advisory: Tenable advisory for CVE-2025-36633 (consult Tenable Security Center or vendor website for official patch links) Workaround: Restrict local system access to trusted users only; implement principle of least privilege for user accounts on systems running Tenable Agent; effectiveness: Partial - reduces attack surface by limiting local access but does not fix underlying vulnerability Mitigation: Monitor and restrict file deletion operations performed by Tenable Agent process; implement application whitelisting to prevent execution of unauthorized file deletion utilities; maintain Windows file system auditing for privileged file deletion events; effectiveness: Partial - detective controls do not prevent exploitation but improve incident response capability Detection: Monitor Windows event logs for file deletion events with SYSTEM privilege context from non-administrative sessions; alert on unexpected modifications to critical system directories; effectiveness: Partial - post-exploitation detection

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +44
POC: 0

Share

EUVD-2025-18279 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy