Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Posted on April 27, 2026 By CWS

A significant security flaw has been identified in Tenable’s Nessus Agent for Windows, which could potentially enable attackers to run harmful code with system-level privileges. This vulnerability poses serious risks to enterprise security teams that depend on this widely-used vulnerability assessment tool.

Understanding the Vulnerability

The discovered flaw allows attackers to exploit Windows junctions, which are symbolic links within the file system. By doing so, malicious actors can delete specific files with elevated SYSTEM-level privileges, escalating the threat to full code execution. Such control could grant attackers unrestricted access over the compromised system.

These attacks exploit a privilege escalation method known as a ‘symlink attack’ or junction misuse. In Windows, NTFS junctions can redirect file operations from one directory to another. When a privileged process like the Nessus Agent service interacts with these junctions without adequate validation, it can be manipulated to target unintended files.

Mechanics of the Exploit

An attacker with local access can strategically place a malicious junction in an area where the Nessus Agent operates. By rerouting the agent’s deletion actions towards critical system files, the attacker can destabilize the operating environment, paving the way for executing malicious payloads under SYSTEM context.

This level of access is particularly dangerous, as SYSTEM privileges surpass even those of standard administrator accounts, enabling attackers to alter files, deploy rootkits, disable security measures, and maintain persistence across system reboots.

Mitigation and Response

This vulnerability affects Windows-based Nessus Agent installations. Organizations that utilize these agents for continuous scanning are at significant risk, especially if they are deployed on key servers and workstations.

Tenable has resolved this issue in Nessus Agent version 11.1.3, available via the Tenable Downloads Portal. The company urges all users to promptly update their systems to mitigate exposure risks. Tenable emphasizes its commitment to swift resolution and responsible vulnerability disclosure, maintaining active collaboration with cybersecurity researchers.

Security administrators are advised to prioritize the deployment of this update, particularly in environments where Nessus Agents are installed on high-value or internet-exposed Windows systems.

Stay updated with our daily cybersecurity news by following us on Google News, LinkedIn, and X. Reach out to us if you wish to feature your cybersecurity stories.

Cyber Security News Tags:Cybersecurity, enterprise security, Nessus Agent, privilege escalation, security update, symlink attack, system privileges, Tenable, vulnerability assessment, Windows vulnerability

Post navigation

Previous Post: Pentest AI Agents Revolutionize Security Testing
Next Post: Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools

Related Posts

Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Cyber Security News
Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption Cyber Security News
Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours Cyber Security News
Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Cyber Security News
Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Cyber Security News
Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Intensifies Efforts Against Southeast Asia Cybercrimes
  • Vidar Malware Uses JPEGs to Hide Payloads
  • Firefox Bug Enables Tor User Tracking
  • Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools
  • Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Intensifies Efforts Against Southeast Asia Cybercrimes
  • Vidar Malware Uses JPEGs to Hide Payloads
  • Firefox Bug Enables Tor User Tracking
  • Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools
  • Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark