CVE-2025-24917

Published May 23, 2025

Last updated 2 months ago

Overview

Description
In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.
Source
vulnreport@tenable.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

vulnreport@tenable.com
CWE-284

Social media

Hype score
Not currently trending

References

Sources include official advisories and independent security research.