Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2698: CWE-639: Authorization Bypass Through User-Controlled Key in Tenable Security Center

0
Medium
VulnerabilityCVE-2026-2698cvecve-2026-2698cwe-639
Published: Mon Feb 23 2026 (02/23/2026, 16:28:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenable
Product: Security Center

Description

An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.

AI-Powered Analysis

AILast updated: 02/23/2026, 17:01:53 UTC

Technical Analysis

CVE-2026-2698 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Tenable Security Center. This vulnerability arises due to improper access control mechanisms that fail to adequately restrict authenticated users from accessing resources or functionalities outside their authorized scope. Specifically, the flaw involves user-controlled keys that are used to determine access permissions; these keys can be manipulated by an authenticated user to gain unauthorized access. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), but no impact on integrity (I:N) or availability (A:N). This means an attacker can potentially view sensitive information they should not have access to but cannot modify or disrupt services. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected product is Tenable Security Center, a widely used vulnerability management platform, which makes this vulnerability particularly relevant for organizations relying on it for security posture management.

Potential Impact

The primary impact of CVE-2026-2698 is unauthorized disclosure of sensitive information due to improper access control, which can lead to data leakage within organizations using Tenable Security Center. Attackers with valid credentials can exploit this flaw to access data or system areas beyond their privileges, potentially exposing vulnerability scan results, asset inventories, or other sensitive security data. This could aid attackers in further reconnaissance or targeted attacks. Although the vulnerability does not affect data integrity or availability, the confidentiality breach alone can have serious consequences, including compliance violations, loss of trust, and increased risk of subsequent attacks. Organizations relying heavily on Tenable Security Center for vulnerability management and security analytics are at risk of internal data exposure or lateral movement by malicious insiders or compromised accounts. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are widely known.

Mitigation Recommendations

To mitigate CVE-2026-2698, organizations should implement the following specific measures: 1) Monitor and restrict user privileges within Tenable Security Center, ensuring the principle of least privilege is strictly enforced to limit the impact of compromised or malicious accounts. 2) Apply any available patches or updates from Tenable promptly once released; in the absence of patches, consider temporary compensating controls such as enhanced logging and alerting on unusual access patterns or privilege escalations. 3) Conduct regular audits of user access and permissions within the Security Center to detect and remediate unauthorized access. 4) Use network segmentation and access controls to limit exposure of the Security Center interface to trusted networks and users only. 5) Educate administrators and users about the risks of credential compromise and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the likelihood of unauthorized access. 6) Engage with Tenable support or security advisories for updates and recommended best practices specific to this vulnerability. These targeted actions go beyond generic advice by focusing on access control hygiene, monitoring, and rapid patch management tailored to the nature of this authorization bypass.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-02-18T15:44:14.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699c852abe58cf853ba9853b

Added to database: 2/23/2026, 4:49:46 PM

Last enriched: 2/23/2026, 5:01:53 PM

Last updated: 2/24/2026, 5:28:14 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats