Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2697: CWE-639: Authorization Bypass Through User-Controlled Key in Tenable Security Center

0
Medium
VulnerabilityCVE-2026-2697cvecve-2026-2697cwe-639
Published: Mon Feb 23 2026 (02/23/2026, 15:17:13 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Security Center

Description

An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:35:18 UTC

Technical Analysis

CVE-2026-2697 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in Tenable Security Center. The flaw arises from an Indirect Object Reference (IDOR) issue involving the 'owner' parameter, which is user-controllable. An authenticated remote attacker can exploit this vulnerability by manipulating the 'owner' parameter to escalate privileges beyond their authorized level. This could allow the attacker to access or modify data and functionality that should be restricted, potentially undermining the confidentiality, integrity, and availability of the system. The vulnerability has a CVSS 3.1 base score of 6.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality, integrity, and availability rated as low (C:L/I:L/A:L). The vulnerability affects Tenable Security Center, a widely used vulnerability management platform, making it a critical asset in many organizations' security infrastructure. Although no known exploits are currently reported in the wild, the presence of this flaw necessitates proactive mitigation. The vulnerability was published on February 23, 2026, and no patches are currently linked, indicating that remediation may still be pending or in development.

Potential Impact

The impact of CVE-2026-2697 on organizations worldwide can be significant due to the role Tenable Security Center plays in vulnerability management and security monitoring. An attacker exploiting this vulnerability could escalate privileges, potentially gaining unauthorized access to sensitive security data, altering vulnerability assessments, or disrupting security operations. This could lead to incomplete or inaccurate security reporting, delayed detection of threats, and increased risk of further compromise. The confidentiality of sensitive information could be compromised, the integrity of security data could be undermined, and availability of security services could be affected if the attacker disrupts normal operations. Organizations relying heavily on Tenable Security Center for their security posture management are at higher risk. The medium severity rating suggests that while the vulnerability is exploitable with some privileges, the overall risk is moderate but still warrants timely attention to prevent exploitation in targeted attacks or insider threat scenarios.

Mitigation Recommendations

1. Monitor Tenable’s official channels closely for patches or updates addressing CVE-2026-2697 and apply them promptly once available. 2. Implement strict access control policies to limit the number of users with privileges that could be exploited via the 'owner' parameter. 3. Conduct regular audits of user permissions and roles within Tenable Security Center to ensure least privilege principles are enforced. 4. Employ network segmentation and firewall rules to restrict access to the Security Center interface to trusted administrative networks only. 5. Enable detailed logging and monitoring of Security Center activities, particularly changes involving ownership or privilege escalation attempts, to detect suspicious behavior early. 6. Consider additional compensating controls such as multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of credential compromise. 7. Educate administrators and security personnel about the vulnerability and the importance of vigilance regarding unusual access patterns or privilege changes. 8. If possible, temporarily restrict or disable features involving the 'owner' parameter until a patch is applied, minimizing the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-02-18T15:05:03.676Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8ebe58cf853bc4b505

Added to database: 2/23/2026, 8:50:22 PM

Last enriched: 3/3/2026, 8:35:18 PM

Last updated: 4/9/2026, 11:26:12 PM

Views: 312

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses