{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/cpes/cpe2.3af5nginx_open_source/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":["cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r30:p2:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_open_source:1.27.0:*:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*","cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*"],"_cs_cves":[{"cvss":4.8,"id":"CVE-2024-31079"},{"cvss":6.5,"id":"CVE-2024-32760"},{"cvss":5.3,"id":"CVE-2024-34161"},{"cvss":5.3,"id":"CVE-2024-35200"},{"cvss":4.7,"id":"CVE-2024-7347"}],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["Sensor Proxy (versions prior to 1.4.0)"],"_cs_severities":["medium"],"_cs_tags":["vulnerability","dos","dataleak"],"_cs_type":"advisory","_cs_vendors":["Tenable"],"content_html":"\u003cp\u003eOn May 22, 2026, CERT-FR published an advisory regarding multiple vulnerabilities discovered in Tenable Sensor Proxy. The advisory highlights that these vulnerabilities could allow an attacker to remotely trigger a denial-of-service condition, compromise data confidentiality, and potentially cause other unspecified security issues. The affected product is Tenable Sensor Proxy versions prior to 1.4.0. Organizations using these versions are vulnerable to these exploits and should upgrade immediately. The specific nature of the unspecified security issue isn\u0026rsquo;t detailed.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003cp\u003eDue to the lack of specific details about the vulnerabilities themselves, a detailed attack chain cannot be constructed. However, a general attack chain based on the described impacts is possible:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eAttacker identifies a vulnerable Tenable Sensor Proxy instance running a version prior to 1.4.0.\u003c/li\u003e\n\u003cli\u003eAttacker exploits CVE-2024-24989, CVE-2024-24990, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-39702, or CVE-2024-7347 to gain unauthorized access. The specific method depends on the individual vulnerability.\u003c/li\u003e\n\u003cli\u003eIf the vulnerability leads to a denial of service, the attacker crafts a specific request to exhaust resources.\u003c/li\u003e\n\u003cli\u003eIf the vulnerability leads to a data confidentiality breach, the attacker may access sensitive data handled by the Sensor Proxy.\u003c/li\u003e\n\u003cli\u003eAttacker may further exploit the system due to unspecified vulnerabilities.\u003c/li\u003e\n\u003cli\u003eThe attacker maintains access for future malicious activities or moves laterally within the network.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of these vulnerabilities could have severe consequences, including disruption of services due to denial-of-service attacks and unauthorized access to sensitive data. The specific impact from the unspecified vulnerability is unknown, but could lead to further system compromise. Organizations running vulnerable versions of Tenable Sensor Proxy are at risk.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eImmediately upgrade Tenable Sensor Proxy to version 1.4.0 or later to remediate the vulnerabilities (\u003ca href=\"https://www.tenable.com/security/tns-2026-15\"\u003ehttps://www.tenable.com/security/tns-2026-15\u003c/a\u003e).\u003c/li\u003e\n\u003cli\u003eMonitor network traffic for suspicious activity targeting Tenable Sensor Proxy instances, using the provided Sigma rule as a base.\u003c/li\u003e\n\u003cli\u003eReview Tenable\u0026rsquo;s security bulletin (tns-2026-15) for detailed information on each vulnerability and mitigation steps.\u003c/li\u003e\n\u003cli\u003eInvestigate any past security events associated with the identified CVEs: CVE-2024-24989, CVE-2024-24990, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-39702, and CVE-2024-7347.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-22T13:04:43Z","date_published":"2026-05-22T13:04:43Z","id":"https://feed.craftedsignal.io/briefs/2026-05-tenable-sensor-proxy-vulns/","summary":"Multiple vulnerabilities in Tenable Sensor Proxy versions prior to 1.4.0 could allow a remote attacker to cause a denial of service, data confidentiality breaches, and other unspecified security impacts.","title":"Multiple Vulnerabilities in Tenable Sensor Proxy","url":"https://feed.craftedsignal.io/briefs/2026-05-tenable-sensor-proxy-vulns/"}],"language":"en","title":"CraftedSignal Threat Feed — Cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*","version":"https://jsonfeed.org/version/1.1"}