CVE-2025-1091

medium

Description

Tenable Identity Exposure leverages third-party software to help provide underlying functionality. Several of the third-party components (node.js, Envoy, libcurl) were found to contain vulnerabilities, and updated versions have been made available by the providers.Out of caution and in line with best practice, Tenable has opted to upgrade these components to address the potential impact of the issues. Tenable Identity Exposure 3.77.8 updates the following:node.js to version 20.18.2.0Envoy to version 1.29.12libcurl to version 8.12.0 Additionally, two separate vulnerabilities were discovered, reported and fixed:A Credential Disclosure vulnerability exists where an administrator could extract the stored SMTP account credentials due to lack of encryption. - CVE-2025-0760    A Broken Authorization schema exists where any authenticated user could download IOA script and configuration files if the URL is known. - CVE-2025-1091 Tenable has released Tenable Identity Exposure Version 3.77.8, which includes fixes to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/identity-exposure

Details

Source: Mitre, NVD

Published: 2025-02-06

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Severity: Medium