Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Tenable Network Monitor 6.5.1 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-network-monitor https://www.tenable.com/downloads/nessus-network-monitor ).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16337 | In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation. |
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2025-10 |
|
Thu, 23 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Tenable Tenable nessus Network Monitor |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Tenable Tenable nessus Network Monitor |
Fri, 23 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation. | |
| Title | Improper Access Control leads to Local Privilege Escalation | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-02-26T18:27:56.754Z
Reserved: 2025-01-28T20:09:40.193Z
Link: CVE-2025-24917
Updated: 2025-05-23T18:12:50.854Z
Status : Analyzed
Published: 2025-05-23T16:15:25.163
Modified: 2025-10-23T14:33:56.970
Link: CVE-2025-24917
No data.
OpenCVE Enrichment
No data.
EUVD