Browse all 73 CVE security advisories affecting Tenable. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Tenable operates primarily as a cybersecurity platform specializing in continuous vulnerability management and exposure assessment for enterprise environments. Its core utility lies in scanning networks and cloud infrastructure to identify misconfigurations and unpatched software, enabling organizations to prioritize remediation efforts effectively. Historically, vulnerabilities within the Tenable ecosystem have predominantly involved remote code execution (RCE) and cross-site scripting (XSS), often stemming from web interface components or API endpoints. These flaws typically allowed attackers to bypass authentication or execute arbitrary commands on affected systems. While the company has maintained a generally robust security posture, past incidents have highlighted risks associated with third-party dependencies and configuration errors in its cloud-based services. The current record of 73 CVEs reflects an ongoing effort to address legacy code issues and secure expanding product suites. Users are advised to maintain strict access controls and apply patches promptly to mitigate potential exploitation vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-2026 | Improper Access Control Allows Denial of Service — AgentCWE-276 | 6.1 | Medium | 2026-02-13 |
| CVE-2025-36632 | Local Privilege Escalation — AgentCWE-276 | 7.8 | High | 2025-06-16 |
| CVE-2025-36631 | Local Privilege Escalation — AgentCWE-269 | 8.4 | High | 2025-06-13 |
| CVE-2025-36633 | Local Privilege Escalation — AgentCWE-269 | 8.8 | High | 2025-06-13 |
This page lists every published CVE security advisory associated with Tenable. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.