CVE-2024-1367

7.2 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Security Center that allows authenticated administrators to execute arbitrary code on the host system by manipulating logging parameters. Only administrators with access to the Security Center application are affected, but successful exploitation gives full system control.

💻 Affected Systems

Products:
  • Security Center
Versions: Specific versions not provided in CVE description; consult Tenable advisory TNS-2024-02 for exact affected versions
Operating Systems: Not specified in CVE; likely multiple OS platforms supported by Security Center
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges in Security Center application; not exploitable by regular users or unauthenticated attackers

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Security Center host, allowing attacker to install persistent backdoors, exfiltrate sensitive data, pivot to other systems, or disrupt security monitoring capabilities.

🟠

Likely Case

Attacker with stolen admin credentials or insider threat uses the vulnerability to establish foothold on security infrastructure, potentially disabling security controls or accessing protected systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the Security Center host itself, though this still represents a significant breach of security infrastructure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but the injection mechanism appears straightforward based on CWE-78 classification

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Tenable advisory TNS-2024-02 for specific patched versions

Vendor Advisory: https://www.tenable.com/security/tns-2024-02

Restart Required: Yes

Instructions:

1. Review Tenable advisory TNS-2024-02 for affected versions. 2. Download and apply the latest Security Center update from Tenable support portal. 3. Restart Security Center services as required by the patch. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit Security Center administrative access to only necessary personnel using principle of least privilege

Network Segmentation

all

Isolate Security Center management interface from general network access

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for Security Center admin accounts
  • Deploy network segmentation to isolate Security Center from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Security Center version against affected versions listed in Tenable advisory TNS-2024-02

Check Version:

Check Security Center web interface or administration console for version information

Verify Fix Applied:

Verify Security Center version is updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual logging configuration changes by admin users
  • Suspicious command execution in system logs following logging parameter modifications

Network Indicators:

  • Unexpected outbound connections from Security Center host
  • Unusual administrative access patterns to Security Center

SIEM Query:

source="security_center" AND (event_type="config_change" AND parameter="logging") OR (process_execution AND parent_process="security_center")

🔗 References

📤 Share & Export