Tenable Nessus Bug and LDAP RCE: What You Need to Know

Tenable Nessus Bug and LDAP RCE: What You Need to Know

Cyble | JoCERT

Overview 

JoCERT has alerted the global cybersecurity community about two critical issues requiring urgent attention from IT professionals and system administrators. The first involves Tenable Nessus Agents, a widely-used vulnerability scanning tool, while the second concerns a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), potentially leading to remote code execution (RCE). Both incidents emphasize the need for prompt action and a proactive approach to cybersecurity

This blog will provide a detailed overview of the incidents, their impacts, and recommended resolution steps to help organizations mitigate potential risks. 

Incident 1: Tenable Nessus Agent Outage 

Incident Overview 

On December 31, 2024, Tenable Nessus Agent versions 10.8.0 and 10.8.1 encountered a critical issue due to a faulty differential plugin update. This bug disrupted systems across multiple regions, including the Americas, Europe, and Asia, leaving Nessus agents offline and unable to perform their core function—vulnerability scanning. The root cause was a rare race condition triggered during plugin updates, which led to the simultaneous compilation of interdependent libraries. 

Impact 

  • Nessus agents running versions 10.8.0 and 10.8.1 stopped functioning, rendering them incapable of conducting vulnerability scans. 

  • Tenable temporarily disabled plugin feed updates for these versions to prevent further issues. 

  • Organizations relying on these agents for vulnerability management faced significant disruptions. 

Resolution Steps 

To address the issue, Tenable provided the following guidance: 

  1. Upgrade or Downgrade Agents 

  • Upgrade to Nessus Agent version 10.8.2. 

  • Downgrade to version 10.7.3 if upgrading is not feasible. 

  1. Plugin Reset 

  • If using agent profiles for updates, a plugin reset is necessary to recover offline agents. This can be achieved using the following methods: 

  • Use a script provided in the Tenable release notes. 

  • Execute the nessuscli reset command. 

  1. Manual Upgrade Process 

  • Download the Tenable Nessus Agent 10.8.2 or 10.7.3 installation package. 

  • Manually upgrade or downgrade agents using the install package. 

  1. Recommendations for Long-Term Management 

  • Maintain vigorous change management processes to minimize risks associated with tool updates. 

  • Consider retaining older, stable software versions for quick rollback scenarios. 

Key Fixes in Nessus Agent Version 10.8.2 

  • Resolved issues causing agents to crash under specific error conditions. 

  • Addressed the race condition that caused agents to go offline following a plugin update. 

Additional Notes 

Organizations should review their network configurations to ensure uninterrupted communication between Nessus agents and Tenable’s infrastructure. For instance, domain allow lists must include *.cloud.tenable.com to ensure compatibility with Tenable’s new domains, reducing operational overhead. 

Incident 2: Windows LDAP Remote Code Execution Vulnerability (CVE-2024-49113) 

Incident Overview 

Microsoft disclosed a critical vulnerability, CVE-2024-49113, impacting the Lightweight Directory Access Protocol (LDAP). LDAP is integral to Microsoft’s Active Directory, facilitating the access and maintenance of directory services. The vulnerability could potentially allow Remote Code Execution (RCE), enabling attackers to exploit directory services and compromise sensitive systems. 

Impact 

An attacker could exploit the vulnerability to: 

  • Execute arbitrary code on the targeted system. 

  • Disrupt directory services, leading to a Denial of Service (DoS). 

  • Compromise sensitive organizational data stored in Active Directory. 

Mitigation Steps 

Microsoft has provided mitigations to reduce the risk associated with this vulnerability. Organizations are advised to: 

  1. Apply Patches Immediately 

  • Ensure the latest security patches are applied to all systems using LDAP services. 

  1. Enhance Security Configurations 

  • Limit access to LDAP servers to trusted entities. 

  • Implement mutual authentication to verify both the server and client identities. 

  1. Monitor for Malicious Activity 

  • Regularly audit LDAP logs for suspicious activity. 

  • Deploy intrusion detection/prevention systems (IDS/IPS) to monitor LDAP traffic. 

  1. Train Employees 

  • Educate users on identifying and avoiding phishing attempts that could lead to LDAP exploitation. 

Key Recommendations 

Applying these mitigations will reduce the likelihood of attackers successfully convincing victims to connect to malicious servers. Organizations should regularly review and update their security protocols to address evolving threats. 

Technical Analysis and Key Learnings 

Tenable Nessus Incident 

The Tenable Nessus outage point out the importance of thorough testing before deploying updates to critical systems. The race condition caused by simultaneous compilation of interdependent libraries could have been identified with more comprehensive testing under varied conditions. This incident highlights the need for: 

  • Strong QA Processes: Test updates across different environments before release. 

  • Fail-Safe Mechanisms: Implement automatic rollbacks or sandboxing for plugin updates to prevent widespread outages. 

Windows LDAP Vulnerability 

The Windows LDAP vulnerability illustrates the critical need for: 

  • Proactive Patch Management: Timely patching is essential to mitigate known vulnerabilities. 

  • Layered Defense Strategies: Relying solely on patching is insufficient. Organizations must adopt a multi-layered approach that includes firewalls, access controls, and continuous monitoring. 

Conclusion 

The Tenable Nessus Agent outage and the Windows LDAP vulnerability (CVE-2024-49113) emphasize the critical importance of proactive vulnerability management and swift response strategies. These incidents highlight the need for vigorous patch management, effective change controls, and the ability to quickly roll back in times of disruption. 

Staying ahead in today’s cybersecurity landscape requires vigilance, routine updates, and strategic planning to mitigate evolving threats. By learning from these events and prioritizing system resilience, organizations can strengthen their defenses and minimize risks. 

References:

The post Tenable Nessus Bug and LDAP RCE: What You Need to Know appeared first on Cyble.

Blog – Cyble – ​Read More