Trending

HomeBlog
Tenable Nessus Bug and LDAP RCE: What You Need to Know
Cyble | JoCERT

Tenable Nessus Bug and LDAP RCE: What You Need to Know

JoCERT warns of critical Tenable Nessus Agent and Windows LDAP vulnerabilities, urging quick action from IT professionals to mitigate cybersecurity risks.

Overview 

JoCERT has alerted the global cybersecurity community about two critical issues requiring urgent attention from IT professionals and system administrators. The first involves Tenable Nessus Agents, a widely-used vulnerability scanning tool, while the second concerns a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), potentially leading to remote code execution (RCE). Both incidents emphasize the need for prompt action and a proactive approach to cybersecurity

This blog will provide a detailed overview of the incidents, their impacts, and recommended resolution steps to help organizations mitigate potential risks. 

Incident 1: Tenable Nessus Agent Outage 

Incident Overview 

On December 31, 2024, Tenable Nessus Agent versions 10.8.0 and 10.8.1 encountered a critical issue due to a faulty differential plugin update. This bug disrupted systems across multiple regions, including the Americas, Europe, and Asia, leaving Nessus agents offline and unable to perform their core function—vulnerability scanning. The root cause was a rare race condition triggered during plugin updates, which led to the simultaneous compilation of interdependent libraries. 

Impact 

  • Nessus agents running versions 10.8.0 and 10.8.1 stopped functioning, rendering them incapable of conducting vulnerability scans. 
  • Tenable temporarily disabled plugin feed updates for these versions to prevent further issues. 
  • Organizations relying on these agents for vulnerability management faced significant disruptions. 

Resolution Steps 

To address the issue, Tenable provided the following guidance: 

report-ad-banner
  1. Upgrade or Downgrade Agents 
  • Upgrade to Nessus Agent version 10.8.2. 
  • Downgrade to version 10.7.3 if upgrading is not feasible. 
  1. Plugin Reset 
  • If using agent profiles for updates, a plugin reset is necessary to recover offline agents. This can be achieved using the following methods: 
  • Use a script provided in the Tenable release notes. 
  • Execute the nessuscli reset command. 
  1. Manual Upgrade Process 
  • Download the Tenable Nessus Agent 10.8.2 or 10.7.3 installation package. 
  • Manually upgrade or downgrade agents using the install package. 
  1. Recommendations for Long-Term Management 
  • Maintain vigorous change management processes to minimize risks associated with tool updates. 
  • Consider retaining older, stable software versions for quick rollback scenarios. 

Key Fixes in Nessus Agent Version 10.8.2 

  • Resolved issues causing agents to crash under specific error conditions. 
  • Addressed the race condition that caused agents to go offline following a plugin update. 

Additional Notes 

Organizations should review their network configurations to ensure uninterrupted communication between Nessus agents and Tenable’s infrastructure. For instance, domain allow lists must include *.cloud.tenable.com to ensure compatibility with Tenable’s new domains, reducing operational overhead. 

Incident 2: Windows LDAP Remote Code Execution Vulnerability (CVE-2024-49113) 

Incident Overview 

Microsoft disclosed a critical vulnerability, CVE-2024-49113, impacting the Lightweight Directory Access Protocol (LDAP). LDAP is integral to Microsoft’s Active Directory, facilitating the access and maintenance of directory services. The vulnerability could potentially allow Remote Code Execution (RCE), enabling attackers to exploit directory services and compromise sensitive systems. 

Impact 

An attacker could exploit the vulnerability to: 

  • Execute arbitrary code on the targeted system. 
  • Disrupt directory services, leading to a Denial of Service (DoS). 
  • Compromise sensitive organizational data stored in Active Directory. 

Mitigation Steps 

Microsoft has provided mitigations to reduce the risk associated with this vulnerability. Organizations are advised to: 

  1. Apply Patches Immediately 
  • Ensure the latest security patches are applied to all systems using LDAP services. 
  1. Enhance Security Configurations 
  • Limit access to LDAP servers to trusted entities. 
  • Implement mutual authentication to verify both the server and client identities. 
  1. Monitor for Malicious Activity 
  • Regularly audit LDAP logs for suspicious activity. 
  • Deploy intrusion detection/prevention systems (IDS/IPS) to monitor LDAP traffic. 
  1. Train Employees 
  • Educate users on identifying and avoiding phishing attempts that could lead to LDAP exploitation. 

Key Recommendations 

Applying these mitigations will reduce the likelihood of attackers successfully convincing victims to connect to malicious servers. Organizations should regularly review and update their security protocols to address evolving threats. 

Technical Analysis and Key Learnings 

Tenable Nessus Incident 

The Tenable Nessus outage point out the importance of thorough testing before deploying updates to critical systems. The race condition caused by simultaneous compilation of interdependent libraries could have been identified with more comprehensive testing under varied conditions. This incident highlights the need for: 

  • Strong QA Processes: Test updates across different environments before release. 
  • Fail-Safe Mechanisms: Implement automatic rollbacks or sandboxing for plugin updates to prevent widespread outages. 

Windows LDAP Vulnerability 

The Windows LDAP vulnerability illustrates the critical need for: 

  • Proactive Patch Management: Timely patching is essential to mitigate known vulnerabilities. 
  • Layered Defense Strategies: Relying solely on patching is insufficient. Organizations must adopt a multi-layered approach that includes firewalls, access controls, and continuous monitoring. 

Conclusion 

The Tenable Nessus Agent outage and the Windows LDAP vulnerability (CVE-2024-49113) emphasize the critical importance of proactive vulnerability management and swift response strategies. These incidents highlight the need for vigorous patch management, effective change controls, and the ability to quickly roll back in times of disruption. 

Staying ahead in today’s cybersecurity landscape requires vigilance, routine updates, and strategic planning to mitigate evolving threats. By learning from these events and prioritizing system resilience, organizations can strengthen their defenses and minimize risks. 

References:

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading