Tenable Identity Exposure < 3.77.17 Multiple Vulnerabilities (TNS-2026-11)

high Nessus Plugin ID 307436

Synopsis

An identity security and threat detection platform running on the remote host is affected by multiple vulnerabilities.

Description

The version of the Tenable Identity Exposure running on the remote host is prior to 3.77.17. It is, therefore, affected by multiple vulnerabilities according to advisory TNS-2026-11:

- A flaw in Node.js's Permissions model allows attackers to bypass --allow-fs-read and --allow-fs-write restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. (CVE-2025-55130)

- Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network. (CVE-2026-26115)

- Improper access control in Curl allows an authorized attacker to elevate privileges over a network.
(CVE-2026-21262)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Tenable Identity Exposure version 3.77.17 or later.

See Also

https://www.tenable.com/security/tns-2026-11

Plugin Details

Severity: High

ID: 307436

File Name: tenable_identity_exposure_3_77_17.nasl

Version: 1.2

Type: Combined

Family: Misc.

Published: 4/18/2026

Updated: 4/20/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2025-55130

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 7

Threat Score: 5

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L

CVSS Score Source: CVE-2026-23941

Vulnerability Information

CPE: cpe:/a:tenable:tenable_ad, cpe:/a:tenable:tenable_identity_exposure

Required KB Items: installed_sw/Tenable.ad

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/8/2026

Vulnerability Publication Date: 4/14/2026

Reference Information

CVE: CVE-2025-55130, CVE-2025-55131, CVE-2025-55132, CVE-2025-59465, CVE-2025-59466, CVE-2026-1965, CVE-2026-21218, CVE-2026-21262, CVE-2026-21637, CVE-2026-21710, CVE-2026-21713, CVE-2026-21714, CVE-2026-21715, CVE-2026-21716, CVE-2026-21717, CVE-2026-23941, CVE-2026-23942, CVE-2026-23943, CVE-2026-26115, CVE-2026-26130, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805

IAVA: 2026-A-0309