CVE-2026-2697
Medium
|5.3Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
An attacker with an account on the Security Center can exploit a flaw to gain higher privileges by manipulating the 'owner' parameter. This means they could potentially access or control parts of the system that they shouldn't, but they must already be logged in to take advantage of this vulnerability.
Technical Description
An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 3 days
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
tenable
Product
security center