Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Report a Vulnerability

Vulnerability Reporting Guidelines

Thank you for working with Tenable to help ensure we can provide a timely response to security issues with our products. Tenable supports responsible disclosure of security vulnerabilities, and we are committed to working with researchers to fully understand and resolve them.

To help ensure that we have enough information to properly evaluate a potential issue, Tenable asks that you include the following information in your report:

  • A description of the issue explaining the vulnerability, including the impact to the user(s) or system. This should clearly describe how the issue crosses privilege boundaries.
  • The affected product or resource (e.g., Tenable.io, Nessus, SecurityCenter, LCE, PVS, Tenable web site), the software version, and the platform you are using (e.g., Windows 10, Debian Linux).
  • A proof-of-concept or functional exploit that demonstrates the issue. If a proof-of-concept is not available, please include any relevant logs generated from your testing.
  • Any caveats or conditions required to exploit the issue. Indicate if there are any non-default system settings, custom configurations, required user interaction, or anything else that would limit the attack.
  • Any vulnerability database identifier you have requested. If you have not requested a CVE identifier, indicate if you would like us to request one.

Please note, potential vulnerabilities that do not by themselves expose a service or application to attack, are not considered valid issues. For example, injecting or the lack of an HTML tag does not necessarily mean an application is vulnerable to cross-site scripting, and injecting a single backtick (`) does not necessarily mean it is vulnerable to SQL injection.

Once we receive your report, Tenable will stay in touch with you to provide updates on our investigation and status of a fix for verified issues. During this time we might also request additional information. If the issue you reported is determined to be valid and affects one of our products, an advisory will be published when a solution is available for our customers.

Please indicate if and how you would like to be credited in the advisory (name, company or affiliation, etc). Tenable does not participate in a public bug bounty program or provide financial awards for finding issues.

Tenable encourages the use of encrypted mail. Our PGP public key can be found below:

PGP Public Key

Have a Vulnerability to Report?

Please read the vulnerability reporting guidelines before submission.

Contact Us
Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.