Tenable Security Center Multiple Vulnerabilities (TNS-2025-18)

high Nessus Plugin ID 265976

Synopsis

An instance of Security Center installed on the remote system is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Tenable Security Center running on the remote host is between 6.5.1 and 6.6.0. It is, therefore, affected by multiple vulnerabilities as referenced in the TNS-2025-18 advisory.

- Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.
(CVE-2025-8715)

- Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected. (CVE-2025-4207)

- PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. (CVE-2025-8713)

- Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. (CVE-2025-8714)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Apply patch SC-202509.1

See Also

http://www.nessus.org/u?ed29eb0f

https://www.tenable.com/security/TNS-2025-18

Plugin Details

Severity: High

ID: 265976

File Name: securitycenter_6_6_0_tns_2025_18.nasl

Version: 1.1

Type: combined

Agent: unix

Family: Misc.

Published: 9/26/2025

Updated: 9/26/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-8715

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tenable:security_center

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2025

Vulnerability Publication Date: 5/8/2025

Reference Information

CVE: CVE-2025-4207, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715