π―Tenable found some serious problems in their software that could let bad guys sneak in and steal information. They want everyone using their software to quickly update it to keep their data safe.
What Happened
On March 3, 2026, Tenable issued a critical security advisory for its Nessus Manager software. This advisory highlights a vulnerability affecting versions 10.10.2 and earlier, as well as versions 10.11.0 to 10.11.2. If you're using these versions, your system could be at risk.
Additionally, on April 9, 2026, Tenable published another security advisory (AV26-336) addressing vulnerabilities in the Tenable Security Center for versions 6.8.0 and earlier. This underscores the ongoing security challenges that Tenable products face, and the necessity for users to stay updated across all their software.
Most recently, on April 14, 2026, Tenable released advisory AV26-354, addressing critical vulnerabilities in Tenable Identity Exposure for versions prior to 3.77.17. This highlights an urgent need for users of this product to also apply updates to mitigate risks associated with these vulnerabilities.
The advisories serve as wake-up calls for users and administrators to take action. The Cyber Centre has urged everyone to review the advisories and apply the necessary updates immediately. Ignoring these could leave your systems vulnerable to potential attacks, making it crucial to act fast.
Why Should You Care
You might be wondering how this affects you personally. If you or your company uses Nessus Manager, Tenable Security Center, or Tenable Identity Exposure, these vulnerabilities could expose sensitive data or allow unauthorized access. Think of it like leaving your front door unlocked; anyone could stroll in and take what they want.
Your security is only as strong as your weakest link. By not updating your software, you risk not just your data but potentially your entire network. Imagine the chaos if a hacker exploited these flaws and caused a data breach β it could impact your finances, reputation, and trust.
What's Being Done
Tenable is already on top of the situation. They've released updates to fix the vulnerabilities in Nessus Manager, Tenable Security Center, and Tenable Identity Exposure. Hereβs what you should do right now:
- Update to Nessus Manager version 10.10.3 or 10.11.3.
- For Tenable Security Center, update to the latest version beyond 6.8.0.
- For Tenable Identity Exposure, update to version 3.77.17 or later.
- Review the security advisories for detailed instructions.
- Monitor your systems for any unusual activity.
Experts are keeping a close eye on how quickly users implement these updates and whether any exploits emerge before the patching process is complete. Stay vigilant!
With multiple advisories issued in quick succession, organizations using Tenable products must prioritize updates to mitigate risks associated with these vulnerabilities. The potential for unauthorized access and data exposure remains high.





