CVE-2025-36636

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Tenable Security Center to access resources beyond their assigned permissions. It affects all Tenable Security Center installations running versions before 6.7.0. The issue stems from improper access control mechanisms.

💻 Affected Systems

Products:
  • Tenable Security Center
Versions: All versions prior to 6.7.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with authenticated users are affected. The vulnerability exists in the core access control logic.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated low-privilege user could access sensitive configuration data, vulnerability scan results, or administrative functions, potentially leading to data exposure or privilege escalation.

🟠

Likely Case

Users with standard accounts may inadvertently or intentionally access reports, assets, or configurations they shouldn't have permission to view, violating security boundaries.

🟢

If Mitigated

With proper network segmentation and strict user role management, the impact is limited to minor information disclosure within authorized user groups.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access. Attackers would need to understand the application's structure to identify unauthorized access paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.0

Vendor Advisory: https://docs.tenable.com/release-notes/Content/security-center/2025.htm#670

Restart Required: No

Instructions:

1. Download Tenable Security Center 6.7.0 from the Tenable support portal. 2. Follow the upgrade procedure documented in the Tenable Security Center Administration Guide. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Strict Role-Based Access Control

all

Implement minimal privilege principles by reviewing and tightening user roles and permissions.

Network Segmentation

all

Restrict access to Tenable Security Center to only authorized management networks.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which users can reach the Tenable Security Center interface
  • Conduct regular audits of user permissions and access logs to detect unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check the Tenable Security Center version via the web interface (Admin > System > Summary) or via SSH: cat /opt/sc/version.txt

Check Version:

cat /opt/sc/version.txt

Verify Fix Applied:

Confirm the version is 6.7.0 or later and test user permissions by attempting to access resources outside assigned roles.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to administrative pages by non-admin users
  • Failed permission checks in application logs
  • User accessing resources outside their typical scope

Network Indicators:

  • HTTP requests to privileged endpoints from non-privileged user accounts

SIEM Query:

source="tenable_sc" AND (event_type="access_denied" OR uri_path="/admin/*" AND user_role!="admin")

🔗 References

📤 Share & Export