CVE-2024-5759

5.4 MEDIUM

📋 TL;DR

An improper privilege management vulnerability in Tenable Security Center allows authenticated attackers to view unauthorized objects and launch scans without proper permissions. This affects organizations using Tenable Security Center with authenticated user accounts. Attackers can escalate privileges within the security management platform.

💻 Affected Systems

Products:
  • Tenable Security Center
Versions: Specific versions not detailed in reference, but Tenable TNS-2024-10 advisory contains details
Operating Systems: All platforms running Tenable Security Center
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where users have some level of authentication to Tenable Security Center.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could launch unauthorized network scans, potentially disrupting operations, and access sensitive vulnerability data about internal systems that should be restricted.

🟠

Likely Case

Malicious insiders or compromised accounts could perform unauthorized vulnerability scans and access security data beyond their assigned privileges.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to privilege escalation within the security platform itself.

🌐 Internet-Facing: MEDIUM - Requires authentication but internet-facing instances could be targeted by attackers with stolen credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain unauthorized access to security data and scanning capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but exploitation appears straightforward once authenticated.

Exploitation requires authenticated access to Tenable Security Center interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenable TNS-2024-10 advisory for specific patched versions

Vendor Advisory: https://www.tenable.com/security/tns-2024-10

Restart Required: Yes

Instructions:

1. Review Tenable TNS-2024-10 advisory 2. Download appropriate patch from Tenable support portal 3. Apply patch following Tenable's upgrade procedures 4. Restart Tenable Security Center services

🔧 Temporary Workarounds

Restrict User Privileges

all

Minimize user permissions to only necessary functions and implement principle of least privilege.

Enhanced Monitoring

all

Monitor for unusual scan activities or privilege escalation attempts in audit logs.

🧯 If You Can't Patch

  • Implement strict access controls and review all user permissions regularly
  • Monitor audit logs for unauthorized scan activities and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Tenable Security Center version against patched versions in TNS-2024-10 advisory

Check Version:

Check version in Tenable Security Center web interface or via admin console

Verify Fix Applied:

Verify version is updated to patched version and test user permissions functionality

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized scan launches
  • Users accessing objects outside their permission scope
  • Privilege escalation attempts in audit logs

Network Indicators:

  • Unexpected scan traffic from Tenable Security Center
  • Scan activities outside normal patterns

SIEM Query:

source="tenable_security_center" AND (event_type="scan_launch" OR event_type="object_access") AND user_privilege="escalated"

🔗 References

📤 Share & Export