No advisories yet.
Solution
Tenable has released Security Center 6.8.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center Note: Patches that include fixes for Apache, PHP and Libcurl were recently released ( https://www.tenable.com/security/tns-2026-06) . Tenable Security Center 6.8.0 includes all of these fixes. Please refer to the Tenable SC Release Notes https://docs.tenable.com/release-notes/Content/security-center/2026.htm for more information.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2026-07 |
|
Mon, 23 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter. | |
| Title | Indirect Object Reference (IDOR) in Security Center | |
| First Time appeared |
Tenable
Tenable security Center |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenable
Tenable security Center |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-02-23T16:04:02.423Z
Reserved: 2026-02-18T15:05:03.676Z
Link: CVE-2026-2697
Updated: 2026-02-23T16:03:56.807Z
Status : Received
Published: 2026-02-23T16:29:37.323
Modified: 2026-02-23T16:29:37.323
Link: CVE-2026-2697
No data.
OpenCVE Enrichment
No data.