Description
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
Published: 2026-02-17
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection leading to Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A command injection flaw exists in Tenable Security Center that permits an authenticated, remote attacker to execute arbitrary code on the host server. The vulnerability is rated with a CVSS score of 7.4 and is classified as CWE‑78, meaning attackers can inject operating‑system commands and take control of the system. Such exploitation would allow full compromise of the security center instance and any data or services exposed on the underlying server.

Affected Systems

The affected systems are Tenable Security Center platforms. Tenable identified patches for popular releases, including versions 6.5.1, 6.6.0, and 6.7.2. Users operating any of these versions should verify the presence of the security updates SC‑202602.1 and SC‑202602.2 before applying the fix.

Risk and Exploitability

The risk rating is high (CVSS 7.4) but the EPSS probability is below 1 %. The CVE description indicates that an authenticated, remote attacker can execute arbitrary code on the host server. The specific authentication mechanism or interface (e.g., web UI or API) is not detailed, so it is not explicitly stated how the attacker gains the required access. The vulnerability is a command injection flaw (CWE‑78) that, if exploited, would allow execution of operating‑system commands on the underlying system. The vulnerability is not listed in the CISA KEV catalog. The exploit would need a path from an authenticated session to the vulnerable command handler, but the exact details are not disclosed in the description.

Generated by OpenCVE AI on April 18, 2026 at 12:02 UTC.

Remediation

Vendor Solution

Tenable has released Security Center Patch SC-202602.2 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center


OpenCVE Recommended Actions

  • Apply Tenable Security Center patch SC‑202602.2 (or SC‑202602.1 + SC‑202602.2) to affected versions 6.5.1, 6.6.0, and 6.7.2.
  • Restrict or remove unnecessary user accounts and enforce least‑privilege authentication for the Security Center service.
  • If an immediate patch is not feasible, isolate the Security Center server to a trusted subnet, enable logging on all privileged executables, and monitor for unexpected command executions.

Generated by OpenCVE AI on April 18, 2026 at 12:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 17 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Description A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
Title [R1] Stand-alone Security Patches Available for Tenable Security Center versions 6.5.1, 6.6.0 and 6.7.2: SC-202602.1 + SC-202602.2
First Time appeared Tenable
Tenable security Center
Weaknesses CWE-78
CPEs cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*
Vendors & Products Tenable
Tenable security Center
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenable Security Center
cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2026-02-26T14:44:19.708Z

Reserved: 2026-02-17T14:22:13.573Z

Link: CVE-2026-2630

cve-icon Vulnrichment

Updated: 2026-02-17T18:57:43.108Z

cve-icon NVD

Status : Deferred

Published: 2026-02-17T19:21:58.060

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses