{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33694","assignerOrgId":"5ac1ecc2-367a-4d16-a0b2-35d495ddd0be","state":"PUBLISHED","assignerShortName":"tenable","dateReserved":"2026-03-23T16:39:06.329Z","datePublished":"2026-04-23T18:09:41.682Z","dateUpdated":"2026-04-24T03:55:34.202Z"},"containers":{"cna":{"providerMetadata":{"orgId":"5ac1ecc2-367a-4d16-a0b2-35d495ddd0be","shortName":"tenable","dateUpdated":"2026-04-23T18:09:41.682Z"},"title":"Junction File Manipulation","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-59","description":"CWE-59 Improper link resolution before file access ('link following')","type":"CWE"}]}],"affected":[{"vendor":"Tenable, Inc.","product":"Tenable Nessus, Tenable Nessus Agent","platforms":["Windows"],"versions":[{"status":"affected","version":"Nessus Agent","lessThanOrEqual":"11.1.2","versionType":".msi"},{"status":"affected","version":"Nessus","lessThanOrEqual":"10.11.3","versionType":".msi"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"This vulnerability allows an attacker to create a junction, enabling the deletion of arbitrary files with SYSTEM privileges. As a result, this condition potentially facilitates arbitrary code execution, whereby an attacker may exploit the vulnerability to execute malicious code with elevated SYSTEM privileges.","supportingMedia":[{"type":"text/html","base64":false,"value":"This vulnerability allows an attacker to create a junction, enabling the deletion of arbitrary files with SYSTEM privileges. As a result, this condition potentially facilitates arbitrary code execution, whereby an attacker may exploit the vulnerability to execute malicious code with elevated SYSTEM privileges."}]}],"references":[{"url":"https://tenable.com/security/tns-2026-12"},{"url":"https://tenable.com/security/tns-2026-13"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"ACTIVE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"PROOF_OF_CONCEPT","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":7.4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P"}}],"source":{"advisory":"TNS-2026-12, TNS-2026-13","discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-23T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-33694"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-24T03:55:34.202Z"}}]}}