Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24916: CWE-284: Improper Access Control in Tenable Network Monitor

0
High
VulnerabilityCVE-2025-24916cvecve-2025-24916cwe-284
Published: Fri May 23 2025 (05/23/2025, 15:46:02 UTC)
Source: CVE
Vendor/Project: Tenable
Product: Network Monitor

Description

When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:59:13 UTC

Technical Analysis

CVE-2025-24916 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Tenable Network Monitor on Windows platforms when installed to non-default locations. Versions prior to 6.5.1 fail to enforce secure permissions on sub-directories within the custom installation path. This misconfiguration allows local users with limited privileges to gain unauthorized access to files or executables within these directories, potentially leading to local privilege escalation. The vulnerability does not require user interaction but does require local access and some level of privilege (low privilege user). The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that exploitation is local, requires high attack complexity, low privileges, no user interaction, and impacts confidentiality, integrity, and availability at a high level. No public exploits are currently known, but the risk remains significant due to the potential for attackers to leverage this flaw to gain administrative control on affected systems. The issue arises specifically from insecure directory permissions when Tenable Network Monitor is installed outside the default path, highlighting the importance of secure installation practices and permission management.

Potential Impact

The primary impact of this vulnerability is local privilege escalation, which can allow an attacker with limited access to elevate their privileges to administrative or system-level control. This can lead to full compromise of the affected host, including unauthorized access to sensitive data, modification or deletion of critical files, and disruption of monitoring services. For organizations relying on Tenable Network Monitor for security visibility, this could undermine the integrity and availability of their security monitoring infrastructure. Attackers exploiting this vulnerability could also use the elevated privileges to move laterally within networks, increasing the scope of compromise. The impact is especially critical in environments where Tenable Network Monitor is deployed on Windows servers or workstations with multiple users and where non-default installation paths are used without proper permission hardening.

Mitigation Recommendations

Organizations should immediately upgrade Tenable Network Monitor to version 6.5.1 or later, where this vulnerability has been addressed. For existing installations on non-default paths, administrators must audit and correct directory permissions to ensure that only authorized users have access to installation sub-directories. Specifically, permissions should be restricted to administrative accounts and the service account running Tenable Network Monitor. Implementing least privilege principles for local users and regularly reviewing file system permissions can prevent exploitation. Additionally, organizations should monitor local user activities for suspicious privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to detect anomalous behavior. Security teams should also educate users about the risks of installing software in non-standard locations without proper security controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
tenable
Date Reserved
2025-01-28T20:09:40.193Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683099ad0acd01a249274022

Added to database: 5/23/2025, 3:52:13 PM

Last enriched: 2/26/2026, 8:59:13 PM

Last updated: 3/25/2026, 12:01:28 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses