Changeflow GovPing Data Privacy & Cybersecurity Tenable Patches High-Severity Arbitrary Code Ex...
Urgent Notice Added Final

Tenable Patches High-Severity Arbitrary Code Execution in Nessus

Favicon for www.csirt.gov.it Italy CSIRT Advisories
Published
Detected
Email

Summary

Tenable released security updates patching a high-severity arbitrary code execution vulnerability in Nessus and Nessus Agent on Windows. Affected versions include Nessus 10.11.3 and earlier, and Nessus Agent 11.1.2 and earlier. The vulnerability, tracked as CVE-2026-33694, allows malicious actors to execute arbitrary code on compromised systems. CSIRT-ITA rates the systemic impact as Medium (64.35) and recommends updating affected products to the latest versions per Tenable's security bulletins.

Published by CSIRT-ITA on acn.gov.it . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Italy CSIRT Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 8 changes logged to date.

What changed

Tenable released patches for a high-severity arbitrary code execution vulnerability (CVE-2026-33694) affecting Nessus versions 10.11.3 and earlier and Nessus Agent versions 11.1.2 and earlier on Windows. The vulnerability allows authenticated attackers to execute arbitrary code on affected systems.

Organizations running affected Nessus or Nessus Agent installations on Windows must prioritize applying the latest security updates referenced in Tenable's bulletins (TNS-2026-12 and TNS-2026-13). Given the high severity and remote code execution capability, unpatched instances represent a significant security risk, particularly for security teams using Nessus for vulnerability scanning across enterprise networks.

What to do next

  1. Update Nessus and Nessus Agent to the latest versions per Tenable security bulletins

Get daily alerts for Italy CSIRT Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CSIRT-ITA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CSIRT-ITA
Published
April 24th, 2026
Instrument
Notice
Branch
Executive
Source language
it
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability remediation Patch management Product security updates
Geographic scope
IT IT

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Cybersecurity Data Privacy

Get alerts for this source

We'll email you when Italy CSIRT Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!