Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Tenable Network Monitor 6.5.1 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-network-monitor https://www.tenable.com/downloads/nessus-network-monitor ).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16336 | When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location. |
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2025-10 |
|
Thu, 23 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Tenable Tenable nessus Network Monitor |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Tenable Tenable nessus Network Monitor |
Fri, 23 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location. | |
| Title | Improper Access Control leads to Local Priviledge Escalation | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-02-26T18:27:57.342Z
Reserved: 2025-01-28T20:09:40.193Z
Link: CVE-2025-24916
Updated: 2025-05-23T16:02:34.920Z
Status : Analyzed
Published: 2025-05-23T16:15:24.997
Modified: 2025-10-23T14:35:21.220
Link: CVE-2025-24916
No data.
OpenCVE Enrichment
No data.
EUVD