Tenable Security Center Multiple Vulnerabilities (TNS-2025-09)

medium Nessus Plugin ID 237580

Synopsis

An instance of Security Center installed on the remote system is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Tenable Security Center running on the remote host is prior to 6.6.0 and missing relevant patches. It is, therefore, affected by multiple vulnerabilities as referenced in the TNS-2025-09 advisory.

- In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory. (CVE-2025-29087)

- Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function. (CVE-2022-25927)

- An integer overflow can be triggered in SQLite's `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. (CVE-2025-3277)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Tenable Security Center 6.6.0 or later or apply patches SC-202505.1 and SC-202506.1.

See Also

https://www.tenable.com/security/TNS-2025-09

Plugin Details

Severity: Medium

ID: 237580

File Name: securitycenter_6_6_0_tns_2025_09.nasl

Version: 1.2

Type: combined

Agent: unix

Family: Misc.

Published: 5/30/2025

Updated: 7/14/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2025-29087

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Threat Score: 5.5

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

CVSS Score Source: CVE-2025-29087

Vulnerability Information

CPE: cpe:/a:tenable:security_center

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/6/2025

Vulnerability Publication Date: 1/24/2023

Reference Information

CVE: CVE-2022-25927, CVE-2025-29087, CVE-2025-3277