CVE-2026-2698

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an authenticated user to access parts of the system they shouldn't be able to reach, potentially exposing sensitive information or functions. It requires that the user is already logged in, but their permissions are not properly enforced, leading to unauthorized access.

Technical Description

An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$793($500-$1K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 23, 2026

about 1 month ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

tenable

Product

security center