- Description
- In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.
- Source
- vulnreport@tenable.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- vulnreport@tenable.com
- CWE-284
- Hype score
- Not currently trending
برای ابزار Tenable که یک ابزار network monitoring و passive vulnerability scanning می باشد ، ۲ آسیب پذیری با کدهای شناسایی CVE-2025-24916 و CVE-2025-24917 از نوع privilege escalation منتشر شده است. https://t.co/P
@AmirHossein_sec
27 May 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidades corregidas en Nessus Network Monitor ❗CVE-2025-24917 ❗CVE-2025-24916 ➡️Más info: https://t.co/sJwDDvAARa https://t.co/oyxNjlv4eN
@CERTpy
23 May 2025
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes