When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.

Subscriptions

Vendors Products
Microsoft Subscribe
Windows Subscribe
Tenable Subscribe
Nessus Network Monitor Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16336 When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
Fixes

Solution

Tenable has released Tenable Network Monitor 6.5.1 to address these issues. The installation files can be obtained from the Tenable Downloads Portal ( https://www.tenable.com/downloads/nessus-network-monitor https://www.tenable.com/downloads/nessus-network-monitor ).


Workaround

No workaround given by the vendor.

History

Thu, 23 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Tenable
Tenable nessus Network Monitor
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Tenable
Tenable nessus Network Monitor

Fri, 23 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 May 2025 16:00:00 +0000

Type Values Removed Values Added
Description When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
Title Improper Access Control leads to Local Priviledge Escalation
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2026-02-26T18:27:57.342Z

Reserved: 2025-01-28T20:09:40.193Z

Link: CVE-2025-24916

cve-icon Vulnrichment

Updated: 2025-05-23T16:02:34.920Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-23T16:15:24.997

Modified: 2025-10-23T14:35:21.220

Link: CVE-2025-24916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses