CVE-2025-24916: CWE-284: Improper Access Control in Tenable Network Monitor
When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
AI Analysis
Technical Summary
CVE-2025-24916 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Tenable Network Monitor on Windows platforms when installed to non-default locations. Versions prior to 6.5.1 fail to enforce secure permissions on sub-directories within the custom installation path. This misconfiguration allows local users with limited privileges to gain unauthorized access to files or executables within these directories, potentially leading to local privilege escalation. The vulnerability does not require user interaction but does require local access and some level of privilege (low privilege user). The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that exploitation is local, requires high attack complexity, low privileges, no user interaction, and impacts confidentiality, integrity, and availability at a high level. No public exploits are currently known, but the risk remains significant due to the potential for attackers to leverage this flaw to gain administrative control on affected systems. The issue arises specifically from insecure directory permissions when Tenable Network Monitor is installed outside the default path, highlighting the importance of secure installation practices and permission management.
Potential Impact
The primary impact of this vulnerability is local privilege escalation, which can allow an attacker with limited access to elevate their privileges to administrative or system-level control. This can lead to full compromise of the affected host, including unauthorized access to sensitive data, modification or deletion of critical files, and disruption of monitoring services. For organizations relying on Tenable Network Monitor for security visibility, this could undermine the integrity and availability of their security monitoring infrastructure. Attackers exploiting this vulnerability could also use the elevated privileges to move laterally within networks, increasing the scope of compromise. The impact is especially critical in environments where Tenable Network Monitor is deployed on Windows servers or workstations with multiple users and where non-default installation paths are used without proper permission hardening.
Mitigation Recommendations
Organizations should immediately upgrade Tenable Network Monitor to version 6.5.1 or later, where this vulnerability has been addressed. For existing installations on non-default paths, administrators must audit and correct directory permissions to ensure that only authorized users have access to installation sub-directories. Specifically, permissions should be restricted to administrative accounts and the service account running Tenable Network Monitor. Implementing least privilege principles for local users and regularly reviewing file system permissions can prevent exploitation. Additionally, organizations should monitor local user activities for suspicious privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to detect anomalous behavior. Security teams should also educate users about the risks of installing software in non-standard locations without proper security controls.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Netherlands, Singapore
CVE-2025-24916: CWE-284: Improper Access Control in Tenable Network Monitor
Description
When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24916 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Tenable Network Monitor on Windows platforms when installed to non-default locations. Versions prior to 6.5.1 fail to enforce secure permissions on sub-directories within the custom installation path. This misconfiguration allows local users with limited privileges to gain unauthorized access to files or executables within these directories, potentially leading to local privilege escalation. The vulnerability does not require user interaction but does require local access and some level of privilege (low privilege user). The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that exploitation is local, requires high attack complexity, low privileges, no user interaction, and impacts confidentiality, integrity, and availability at a high level. No public exploits are currently known, but the risk remains significant due to the potential for attackers to leverage this flaw to gain administrative control on affected systems. The issue arises specifically from insecure directory permissions when Tenable Network Monitor is installed outside the default path, highlighting the importance of secure installation practices and permission management.
Potential Impact
The primary impact of this vulnerability is local privilege escalation, which can allow an attacker with limited access to elevate their privileges to administrative or system-level control. This can lead to full compromise of the affected host, including unauthorized access to sensitive data, modification or deletion of critical files, and disruption of monitoring services. For organizations relying on Tenable Network Monitor for security visibility, this could undermine the integrity and availability of their security monitoring infrastructure. Attackers exploiting this vulnerability could also use the elevated privileges to move laterally within networks, increasing the scope of compromise. The impact is especially critical in environments where Tenable Network Monitor is deployed on Windows servers or workstations with multiple users and where non-default installation paths are used without proper permission hardening.
Mitigation Recommendations
Organizations should immediately upgrade Tenable Network Monitor to version 6.5.1 or later, where this vulnerability has been addressed. For existing installations on non-default paths, administrators must audit and correct directory permissions to ensure that only authorized users have access to installation sub-directories. Specifically, permissions should be restricted to administrative accounts and the service account running Tenable Network Monitor. Implementing least privilege principles for local users and regularly reviewing file system permissions can prevent exploitation. Additionally, organizations should monitor local user activities for suspicious privilege escalation attempts and consider deploying endpoint detection and response (EDR) solutions to detect anomalous behavior. Security teams should also educate users about the risks of installing software in non-standard locations without proper security controls.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- tenable
- Date Reserved
- 2025-01-28T20:09:40.193Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683099ad0acd01a249274022
Added to database: 5/23/2025, 3:52:13 PM
Last enriched: 2/26/2026, 8:59:13 PM
Last updated: 3/25/2026, 12:01:28 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.