Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Tenable has released Security Center 6.8.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center Note: Patches that include fixes for Apache, PHP and Libcurl were recently released ( https://www.tenable.com/security/tns-2026-06) . Tenable Security Center 6.8.0 includes all of these fixes. Please refer to the Tenable SC Release Notes https://docs.tenable.com/release-notes/Content/security-center/2026.htm for more information.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2026-07 |
|
Mon, 23 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter. | |
| Title | Indirect Object Reference (IDOR) in Security Center | |
| First Time appeared |
Tenable
Tenable security Center |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenable
Tenable security Center |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-02-26T14:44:10.953Z
Reserved: 2026-02-18T15:05:03.676Z
Link: CVE-2026-2697
Updated: 2026-02-23T16:03:56.807Z
Status : Analyzed
Published: 2026-02-23T16:29:37.323
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-2697
No data.
OpenCVE Enrichment
Updated: 2026-04-18T11:15:35Z