Tenable Security Center < 6.8.0 Multiple Vulnerabilities (TNS-2026-07)

medium Nessus Plugin ID 299698

Synopsis

An instance of Security Center installed on the remote system is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Tenable Security Center running on the remote host is prior to 6.8.0. It is, therefore, affected by multiple vulnerabilities as referenced in the TNS-2026-07 advisory.

- A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. (CVE-2023-6918)

- Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected. (CVE-2025-12818)

- Security Center leverages third-party software to help provide underlying functionality. Several of the third-party components (libssh, postgresql) were found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with best practice, Tenable has opted to upgrade these components to address the potential impact of the issues. Security Center 6.8.0 updates libssh to version 1.11.1 and postgresql to version 16.11 to address the identified vulnerabilities. (CVE-2023-6918, CVE-2025-12818)

- An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter. (CVE-2026-2697)

- An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope. (CVE-2026-2698)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Tenable Security Center 6.8.0 or later.

See Also

http://www.nessus.org/u?d5587a0b

https://www.tenable.com/security/TNS-2026-07

Plugin Details

Severity: Medium

ID: 299698

File Name: securitycenter_6_8_0_tns_2026_07.nasl

Version: 1.1

Type: combined

Agent: unix

Family: Misc.

Published: 2/20/2026

Updated: 2/20/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Critical

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-12818

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2026-2698

Vulnerability Information

CPE: cpe:/a:tenable:security_center

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/18/2026

Vulnerability Publication Date: 12/18/2023

Reference Information

CVE: CVE-2023-6918, CVE-2025-12818, CVE-2026-2697, CVE-2026-2698