An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.

Project Subscriptions

Vendors Products
Tenable Subscribe
Security Center Subscribe
Advisories

No advisories yet.

Fixes

Solution

Tenable has released Security Center 6.8.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center Note: Patches that include fixes for Apache, PHP and Libcurl were recently released ( https://www.tenable.com/security/tns-2026-06) . Tenable Security Center 6.8.0 includes all of these fixes. Please refer to the Tenable SC Release Notes https://docs.tenable.com/release-notes/Content/security-center/2026.htm  for more information.


Workaround

No workaround given by the vendor.

History

Mon, 23 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
Description An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.
Title Indirect Object Reference (IDOR) in Security Center
First Time appeared Tenable
Tenable security Center
Weaknesses CWE-639
CPEs cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*
Vendors & Products Tenable
Tenable security Center
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2026-02-23T16:04:02.423Z

Reserved: 2026-02-18T15:05:03.676Z

Link: CVE-2026-2697

cve-icon Vulnrichment

Updated: 2026-02-23T16:03:56.807Z

cve-icon NVD

Status : Received

Published: 2026-02-23T16:29:37.323

Modified: 2026-02-23T16:29:37.323

Link: CVE-2026-2697

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses