First published: Wed Jun 12 2024(Updated: )
An improper privilege management vulnerability exists in Tenable Security Center where an authenticated, remote attacker could view unauthorized objects and launch scans without having the required privileges
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Security Center | <=6.3.0 |
Tenable has released Security Center 6.4.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5759 is rated as high severity due to its potential for unauthorized access.
To fix CVE-2024-5759, upgrade Tenable Security Center to version 6.4.0 or later.
CVE-2024-5759 allows an authenticated attacker to exploit improper privilege management, leading to unauthorized object visibility and the ability to launch scans.
CVE-2024-5759 affects all versions of Tenable Security Center up to and including version 6.3.0.
There is no official workaround for CVE-2024-5759; applying the correct software update is essential.