A command injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Logging parameters, which could lead to the execution of arbitrary code on the Security Center host. 
                
            References
                    | Link | Resource | 
|---|---|
| https://www.tenable.com/security/tns-2024-02 | Vendor Advisory | 
| https://www.tenable.com/security/tns-2024-02 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.tenable.com/security/tns-2024-02 - Vendor Advisory | 
19 Nov 2024, 16:06
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Tenable
         Tenable security Center  | 
|
| CPE | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
| References | () https://www.tenable.com/security/tns-2024-02 - Vendor Advisory | |
| Summary | 
        
        
  | 
14 Feb 2024, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-14 22:15
Updated : 2024-11-21 08:50
NVD link : CVE-2024-1367
Mitre link : CVE-2024-1367
CVE.ORG link : CVE-2024-1367
JSON object : View
Products Affected
                tenable
- security_center
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
