CVE-2025-24916

When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
References
Link Resource
https://www.tenable.com/security/tns-2025-10 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

23 Oct 2025, 14:35

Type Values Removed Values Added
References () https://www.tenable.com/security/tns-2025-10 - () https://www.tenable.com/security/tns-2025-10 - Vendor Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
First Time Tenable
Microsoft windows
Tenable nessus Network Monitor
Microsoft

28 May 2025, 14:58

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-23 16:15

Updated : 2025-10-23 14:35


NVD link : CVE-2025-24916

Mitre link : CVE-2025-24916

CVE.ORG link : CVE-2025-24916


JSON object : View

Products Affected

tenable

  • nessus_network_monitor

microsoft

  • windows
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo