Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2630: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Tenable Security Center

0
High
VulnerabilityCVE-2026-2630cvecve-2026-2630cwe-78
Published: Tue Feb 17 2026 (02/17/2026, 18:19:38 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Security Center

Description

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 20:32:15 UTC

Technical Analysis

CVE-2026-2630 is an OS Command Injection vulnerability identified in Tenable Security Center, a widely used vulnerability management platform. The vulnerability arises from improper neutralization of special characters in OS commands (CWE-78), allowing an authenticated remote attacker to inject and execute arbitrary commands on the underlying server hosting the Security Center. This can lead to complete system compromise, including unauthorized data access, modification, or service disruption. The vulnerability requires the attacker to have valid credentials (low privilege required) but does not require any additional user interaction. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, combined with network attack vector and low attack complexity. Although no exploits have been reported in the wild yet, the critical nature of the flaw and the widespread use of Tenable Security Center in enterprise environments make this a significant threat. The affected versions are currently unspecified (noted as '0'), indicating all versions or a placeholder pending further details. The vulnerability was published on February 17, 2026, and no official patches have been linked yet, emphasizing the need for immediate attention from users of this product.

Potential Impact

The impact of CVE-2026-2630 is severe for organizations using Tenable Security Center. Successful exploitation enables attackers to execute arbitrary OS commands on the server, potentially leading to full system compromise. This includes unauthorized access to sensitive vulnerability data, manipulation or deletion of security reports, and disruption of vulnerability management operations. The breach of confidentiality could expose critical security posture information, while integrity and availability impacts could undermine an organization's ability to detect and respond to threats effectively. Given Tenable Security Center's role in security monitoring, a compromised instance could serve as a pivot point for further network intrusion or lateral movement. Organizations worldwide relying on this product for vulnerability management face increased risk of targeted attacks, data breaches, and operational downtime.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict access to Tenable Security Center to trusted administrators only, enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 2) Monitor and audit all administrative activities and login attempts for suspicious behavior. 3) Employ network segmentation to isolate the Security Center server from less trusted network zones. 4) Use application-layer firewalls or intrusion detection/prevention systems to detect and block anomalous command injection attempts. 5) Regularly back up Security Center configurations and data to enable recovery in case of compromise. 6) Stay informed about vendor updates and apply patches immediately once available. 7) Conduct internal penetration testing focusing on command injection vectors to identify potential exploitation paths. These steps go beyond generic advice by emphasizing access control hardening, monitoring, and network isolation tailored to the specific threat.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-02-17T14:22:13.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994b74c80d747be20cdd662

Added to database: 2/17/2026, 6:45:32 PM

Last enriched: 3/4/2026, 8:32:15 PM

Last updated: 4/3/2026, 7:48:10 PM

Views: 349

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses