CVE-2025-24917

In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.
References
Link Resource
https://www.tenable.com/security/tns-2025-10 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

23 Oct 2025, 14:33

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
References () https://www.tenable.com/security/tns-2025-10 - () https://www.tenable.com/security/tns-2025-10 - Vendor Advisory
First Time Tenable
Microsoft windows
Tenable nessus Network Monitor
Microsoft

28 May 2025, 14:58

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-23 16:15

Updated : 2025-10-23 14:33


NVD link : CVE-2025-24917

Mitre link : CVE-2025-24917

CVE.ORG link : CVE-2025-24917


JSON object : View

Products Affected

tenable

  • nessus_network_monitor

microsoft

  • windows
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo