{"id":65129,"date":"2026-04-09T10:38:57","date_gmt":"2026-04-09T08:38:57","guid":{"rendered":"https:\/\/www.usd.de\/?p=65129"},"modified":"2026-04-09T10:38:59","modified_gmt":"2026-04-09T08:38:59","slug":"security-advisories-entra-id-tenable-nessus-manager","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/security-advisories-entra-id-tenable-nessus-manager\/","title":{"rendered":"Security Advisories on Entra ID and Tenable Nessus Manager"},"content":{"rendered":"\n<p>The <a href=\"https:\/\/herolab.usd.de\/en\/our-analysts\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/our-analysts\/\" target=\"_blank\" rel=\"noopener\">pentest professionals<\/a> at <a href=\"https:\/\/herolab.usd.de\/en\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a> identified a vulnerability during a <a href=\"https:\/\/www.usd.de\/en\/pentest\/pentest-cloud\/\">cloud pentest<\/a> that allows the circumvention of conditional access policies for privileged identities in <strong>Microsoft Entra ID<\/strong> through the combination of role-based policy assignment and Privileged Identity Management (PIM).<\/p>\n\n\n\n<p>Two additional vulnerabilities were identified during a <a href=\"https:\/\/www.usd.de\/en\/pentest\/pentest-webapplications\/\">web application pentest<\/a> of <strong>Tenable Nessus Manager<\/strong>, which allow low-privileged users to read arbitrary files at the operating system level.<\/p>\n\n\n\n<p>The vulnerabilities were reported to the vendors as part of the&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>. Detailed information about the advisories can be found here:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-73\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-73\/\" target=\"_blank\" rel=\"noopener\">usd-2025-73<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Entra ID<\/td><td class=\"has-text-align-center\" data-align=\"center\">Insufficient Granularity of Access Control (CWE-1220)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2026-003\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2026-003\/\" target=\"_blank\" rel=\"noopener\">usd-2026-003<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Tenable Nessus Manager<\/td><td class=\"has-text-align-center\" data-align=\"center\">Path Traversal (CWE-35)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2026-004\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2026-004\/\" target=\"_blank\" rel=\"noopener\">usd-2026-004<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Tenable Nessus Manager<\/td><td class=\"has-text-align-center\" data-align=\"center\">Missing Authorization (CWE-862)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pentest professionals at usd HeroLab identified a vulnerability during a cloud pentest that allows the circumvention of conditional access policies for privileged identities in Microsoft Entra ID through the combination of role-based policy assignment and Privileged Identity Management (PIM). Two additional vulnerabilities were identified during a web application pentest of Tenable Nessus Manager, which [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":46998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,374,1674,10757],"tags":[11992,15050,378,380,8541,381,15051,5715],"class_list":["post-65129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-pentests-security-analyses-en","category-security-advisories-en","category-usd-herolab-en","tag-cloud-pentest-en","tag-entra-id","tag-pentest-en","tag-security-advisories-en","tag-security-advisory-en","tag-security-research-en","tag-tenable-nessus-manager","tag-web-application-pentest"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/65129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=65129"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/65129\/revisions"}],"predecessor-version":[{"id":65168,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/65129\/revisions\/65168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/46998"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=65129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=65129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=65129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}