When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.tenable.com/security/tns-2025-10 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    23 Oct 2025, 14:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time | Microsoft Microsoft windows Tenable Tenable nessus Network Monitor | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:* | |
| References | () https://www.tenable.com/security/tns-2025-10 - Vendor Advisory | 
28 May 2025, 14:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
23 May 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-05-23 16:15
Updated : 2025-10-23 14:35
NVD link : CVE-2025-24916
Mitre link : CVE-2025-24916
CVE.ORG link : CVE-2025-24916
JSON object : View
Products Affected
                tenable
- nessus_network_monitor
microsoft
- windows
CWE
                