CVE-2026-2697 PUBLISHED

Indirect Object Reference (IDOR) in Security Center

Assigner: tenable
Reserved: 18.02.2026 Published: 23.02.2026 Updated: 23.02.2026

An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 2.1

Product Status

Vendor Tenable
Product Security Center
Versions Default: affected
  • affected from 0 to 6.8.0 (excl.)

Solutions

Tenable has released Security Center 6.8.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center

Note: Patches that include fixes for Apache, PHP and Libcurl were recently released ( https://www.tenable.com/security/tns-2026-06) . Tenable Security Center 6.8.0 includes all of these fixes. Please refer to the Tenable SC Release Notes https://docs.tenable.com/release-notes/Content/security-center/2026.htm  for more information.

References

Problem Types

  • CWE-639: Authorization Bypass Through User-Controlled Key CWE

Impacts

  • CAPEC-233 Privilege Escalation