<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3ofedoraprojectfedora39/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 22 May 2026 13:04:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3ofedoraprojectfedora39/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Tenable Sensor Proxy</title><link>https://feed.craftedsignal.io/briefs/2026-05-tenable-sensor-proxy-vulns/</link><pubDate>Fri, 22 May 2026 13:04:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tenable-sensor-proxy-vulns/</guid><description>Multiple vulnerabilities in Tenable Sensor Proxy versions prior to 1.4.0 could allow a remote attacker to cause a denial of service, data confidentiality breaches, and other unspecified security impacts.</description><content:encoded><![CDATA[<p>On May 22, 2026, CERT-FR published an advisory regarding multiple vulnerabilities discovered in Tenable Sensor Proxy. The advisory highlights that these vulnerabilities could allow an attacker to remotely trigger a denial-of-service condition, compromise data confidentiality, and potentially cause other unspecified security issues. The affected product is Tenable Sensor Proxy versions prior to 1.4.0. Organizations using these versions are vulnerable to these exploits and should upgrade immediately. The specific nature of the unspecified security issue isn&rsquo;t detailed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of specific details about the vulnerabilities themselves, a detailed attack chain cannot be constructed. However, a general attack chain based on the described impacts is possible:</p>
<ol>
<li>Attacker identifies a vulnerable Tenable Sensor Proxy instance running a version prior to 1.4.0.</li>
<li>Attacker exploits CVE-2024-24989, CVE-2024-24990, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-39702, or CVE-2024-7347 to gain unauthorized access. The specific method depends on the individual vulnerability.</li>
<li>If the vulnerability leads to a denial of service, the attacker crafts a specific request to exhaust resources.</li>
<li>If the vulnerability leads to a data confidentiality breach, the attacker may access sensitive data handled by the Sensor Proxy.</li>
<li>Attacker may further exploit the system due to unspecified vulnerabilities.</li>
<li>The attacker maintains access for future malicious activities or moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences, including disruption of services due to denial-of-service attacks and unauthorized access to sensitive data. The specific impact from the unspecified vulnerability is unknown, but could lead to further system compromise. Organizations running vulnerable versions of Tenable Sensor Proxy are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Tenable Sensor Proxy to version 1.4.0 or later to remediate the vulnerabilities (<a href="https://www.tenable.com/security/tns-2026-15">https://www.tenable.com/security/tns-2026-15</a>).</li>
<li>Monitor network traffic for suspicious activity targeting Tenable Sensor Proxy instances, using the provided Sigma rule as a base.</li>
<li>Review Tenable&rsquo;s security bulletin (tns-2026-15) for detailed information on each vulnerability and mitigation steps.</li>
<li>Investigate any past security events associated with the identified CVEs: CVE-2024-24989, CVE-2024-24990, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-39702, and CVE-2024-7347.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>dos</category><category>dataleak</category></item></channel></rss>