Learn about CVE-2020-5793, a vulnerability in Tenable Nessus for Windows & Nessus Agent allowing local attackers to escalate privileges. Find mitigation steps and patching advice.
A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
Understanding CVE-2020-5793
This CVE identifies a local privilege escalation vulnerability in Tenable Nessus for Windows and Tenable Nessus Agent for Windows.
What is CVE-2020-5793?
The vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows allows an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory.
The Impact of CVE-2020-5793
Technical Details of CVE-2020-5793
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability allows an attacker to copy user-supplied files to a specific path in a named user directory, leading to potential privilege escalation.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from this vulnerability by following these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates