Tenable Attack Surface Management 2025 Release Notes
Tip: You can subscribe to receive alerts for Tenable documentation updates.
These release notes are listed in reverse chronological order.
These release notes are listed in reverse chronological order.
Bug Fix |
---|
Tenable Attack Surface Management now allows you to export assets that match a valid filter. |
Tenable Attack Surface Management now validates filter expressions on both the front-end and back-end. Additionally, it shows an error message whenever a user error occurs. |
Bug Fix |
---|
Tenable Attack Surface Management now ensures that elements in the Suggestion blocklist items list can be readded after deletion. |
Improvement |
---|
The CVEs on the asset details page now links to Common Vulnerabilities and Exposures (CVEs). |
Tenable Attack Surface Management now shows improved CVE data according to descriptions and scoring. |
Tenable Attack Surface Management now features enhanced Common Platform Enumeration (CPE) resolutions for CVEs, ensuring more consistent and accurate CVE findings using Tenable sources. |
Bug Fix |
---|
The Reports page in Tenable Attack Surface Management displays correctly. |
Clicking the close button in the Tenable MSSP Portal impersonation overlay within Tenable Attack Surface Management now redirects to Tenable Vulnerability Management. |
Bug Fix |
---|
Tenable Attack Surface Management now ensures that the Suggestion Rules details text correctly displays UTF-8 (non-ASCII) characters. |
The Workspace launcher now functions correctly when accessing Tenable Identity Exposure from Tenable Attack Surface Management. |
Links present in Subscription Alerts no longer show access-related errors if a user has proper access and permissions to the inventory. |
Copyright © 2025 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other products or services are trademarks of their respective owners.