CVE-2025-36630
Tenable Nessus vulnerability analysis and mitigation

Overview

In Tenable Nessus versions prior to 10.8.5 on Windows hosts, a critical security vulnerability (CVE-2025-36630) was discovered that allows non-administrative users to overwrite arbitrary local system files with log content at SYSTEM privilege. The vulnerability was discovered in May 2025 and patched with the release of Nessus versions 10.8.5 and 10.9.0 on June 30, 2025 (Tenable Advisory).

Technical details

The vulnerability stems from improper privilege management (CWE-269) in Nessus's logging mechanism on Windows systems. It has received a CVSSv3.1 base score of 8.4 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H. The vulnerability requires local access and low privileges to exploit, but does not require user interaction (Tenable Advisory, NVD).

Impact

The vulnerability allows non-administrative users to overwrite any system file with log content at SYSTEM privilege level. This could lead to system instability, privilege escalation, or denial of service by tampering with critical system files. The impact is particularly concerning in multi-user environments or shared systems (GBHackers).

Mitigation and workarounds

Tenable has released Nessus versions 10.8.5 and 10.9.0 to address this vulnerability. Users are strongly urged to upgrade immediately to these versions. Additionally, it is recommended to implement strict access controls to limit local user privileges and monitor for unauthorized file modifications (Tenable Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management