Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5793 : Security Advisory and Response

Learn about CVE-2020-5793, a vulnerability in Tenable Nessus for Windows & Nessus Agent allowing local attackers to escalate privileges. Find mitigation steps and patching advice.

A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.

Understanding CVE-2020-5793

This CVE identifies a local privilege escalation vulnerability in Tenable Nessus for Windows and Tenable Nessus Agent for Windows.

What is CVE-2020-5793?

The vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows allows an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory.

The Impact of CVE-2020-5793

        An authenticated local attacker can escalate privileges on the Windows system by exploiting this vulnerability.

Technical Details of CVE-2020-5793

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability allows an attacker to copy user-supplied files to a specific path in a named user directory, leading to potential privilege escalation.

Affected Systems and Versions

        Tenable Nessus for Windows versions 8.9.0 through 8.12.0
        Tenable Nessus Agent for Windows versions 8.0.0 and 8.1.0

Exploitation Mechanism

        Attacker needs valid credentials on the Windows system
        Create a malicious file and copy it to a system directory

Mitigation and Prevention

Protect your systems from this vulnerability by following these steps:

Immediate Steps to Take

        Apply vendor-provided patches and updates
        Monitor system logs for any suspicious activities
        Restrict user permissions to minimize the impact of potential attacks

Long-Term Security Practices

        Conduct regular security audits and vulnerability assessments
        Educate users on safe computing practices and the importance of strong credentials
        Implement least privilege access policies to limit user capabilities

Patching and Updates

        Regularly check for security updates and patches from Tenable for Nessus and Nessus Agent for Windows
        Apply updates promptly to ensure the latest security fixes are in place

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now