CVE-2026-4433
Description
An SSH misconfigurations exists in Tenable OT that led to the potential exfiltration of socket, port, and service information via the ostunnel user and GatewayPorts. This could be used to potentially glean information about the underlying system and give an attacker information that could be used to attempt to compromise the host.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An SSH misconfiguration in Tenable OT allows the ostunnel user to exfiltrate socket, port, and service information via GatewayPorts, potentially aiding host compromise.
Vulnerability
Overview
CVE-2026-4433 describes an SSH misconfiguration in Tenable OT that permits the ostunnel user to potentially exfiltrate socket, port, and service information via GatewayPorts. This misconfiguration could allow an attacker to glean details about the underlying system, which might be used to attempt further compromise of the host [1].
Exploitation
Context
The vulnerability is rooted in the SSH configuration, specifically involving the ostunnel user and the GatewayPorts setting. An attacker with access to the ostunnel user account could leverage this misconfiguration to forward ports and extract information about internal services. The attack does not require authentication beyond the ostunnel user's credentials, and the network position would need to allowlist may be bypassed if GatewayPorts is enabled [1].
Impact
If exploited, an attacker could obtain sensitive information such as open sockets, ports, and running services on the Tenable OT system. This information leakage could serve as a stepping stone for more targeted attacks, potentially leading to full host compromise. The severity is rated as Low, indicating that the vulnerability requires specific conditions and does not directly allow remote code execution or privilege escalation [1].
Mitigation
Tenable has released a patch, tenable-ot-platform-137, which addresses the SSH misconfiguration. The fix is included in Tenable OT Security and Tenable OT Security Enterprise Manager ISOs dated March 18, 2026. Users are strongly encouraged to apply the patch or upgrade to the latest ISO to remediate the vulnerability [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.