- Description
- When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
- Source
- vulnreport@tenable.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- vulnreport@tenable.com
- CWE-284
- Hype score
- Not currently trending
برای ابزار Tenable که یک ابزار network monitoring و passive vulnerability scanning می باشد ، ۲ آسیب پذیری با کدهای شناسایی CVE-2025-24916 و CVE-2025-24917 از نوع privilege escalation منتشر شده است. https://t.co/P
@AmirHossein_sec
27 May 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-24916 When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permission… https://t.co/w2KRPytnYt
@CVEnew
24 May 2025
141 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidades corregidas en Nessus Network Monitor ❗CVE-2025-24917 ❗CVE-2025-24916 ➡️Más info: https://t.co/sJwDDvAARa https://t.co/oyxNjlv4eN
@CERTpy
23 May 2025
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes