Impact
A misconfiguration in the SSH configuration of Tenable OT exposes socket, port, and service information through the ostunnel user and GatewayPorts settings. This flaw allows an attacker to exfiltrate details about the underlying system, potentially aiding further compromise attempts. The vulnerability is a configuration error that can reveal critical system data.
Affected Systems
The affected product is Tenable OT Security and Tenable OT Security Enterprise Manager, part of Tenable Operation Technology. Specific software versions are not listed, indicating that the issue applies to the currently deployed products as well as new installations when using the supplied ISO.
Risk and Exploitability
The CVSS score of 1.9 denotes low severity, and EPSS data is not available. As Tenable has not listed this vulnerability in the CISA KEV catalog, no known exploits are publicly documented. The likely attack vector is remote, requiring an attacker to gain SSH access to the system; the misconfiguration can then be exploited to obtain service information. Given the low severity score but potential for gathering credentials or system insight, the overall risk is moderate until a patch is applied.
OpenCVE Enrichment