CVE-2025-24917

In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.
References
Link Resource
https://www.tenable.com/security/tns-2025-10 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

23 Oct 2025, 14:33

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
References () https://www.tenable.com/security/tns-2025-10 - () https://www.tenable.com/security/tns-2025-10 - Vendor Advisory
First Time Microsoft windows
Microsoft
Tenable
Tenable nessus Network Monitor
CWE NVD-CWE-noinfo

28 May 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) En versiones de Tenable Network Monitor anteriores a 6.5.1 en un host Windows, se descubrió que un usuario no administrativo podía almacenar archivos en un directorio local para ejecutar código arbitrario con privilegios de SYSTEM, lo que potencialmente podía provocar una escalada de privilegios locales.

23 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-23 16:15

Updated : 2025-10-23 14:33


NVD link : CVE-2025-24917

Mitre link : CVE-2025-24917

CVE.ORG link : CVE-2025-24917


JSON object : View

Products Affected

tenable

  • nessus_network_monitor

microsoft

  • windows
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo