CVE-2026-2698
Medium
|5.7Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an authenticated user to access parts of the system they shouldn't be able to reach, potentially exposing sensitive information or functions. It requires that the user is already logged in, but their permissions are not properly enforced, leading to unauthorized access.
Technical Description
An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$793($500-$1K)
Vendor Response
Grade APatched in 2 days
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
tenable
Product
security center