Tenable Vulnerability Management 2025 Release Notes
Tip: You can subscribe to receive alerts for Tenable documentation updates.
These release notes are listed in reverse chronological order.
These release notes are listed in reverse chronological order.
In Vulnerability Intelligence, you can now export a PDF with details about each CVE entry to share with your organization. You can also schedule exports, email them, and password-protect them.
To learn more, see Export CVE Details in the Tenable Vulnerability Management User Guide or contact your Tenable representative.
Tenable is pleased to announce Explore, an updated version of Assets and Findings. Explore has all the same features you currently use, plus many new ones—all in a streamlined design that highlights crucial details about your attack surface.
While Explore is being released as a preview which will run alongside Assets and Findings during a transition period, you can start using it right away as a replacement for the legacy pages.
In addition to its new design, Explore has the following new features:
Grouped resources — Group assets or findings and view them in drop-downs > designed like spreadsheet pivot tables.
Query builder — With the same easy-to-use query builder as the one in Exposure Response and Vulnerability Intelligence, build, save, and share custom lists using all the same filters, plus new ones.
New asset types — On the new Assets page, view assets by their profile or operating system, as described in Asset Types.
New asset filters — On the new Assets page, filter by Device Class, Device Subclass, and OS Category, as described in Asset Filters.
Add assets to scans — On the new Assets page, add assets to existing scans.
Findings by category — On the new Findings page, view findings by VPR, severity or state—or, for host audit findings, by the result of the audit. For more information, see Findings Types.
Software vulnerabilities — On the new Findings page, view information about software-related vulnerabilities in new columns: Product, Vendor, Product Type, Version, Path, Fix Type, and Fix. In addition, group Vulnerabilities by Product.
For complete coverage of these features, see Explore in the Early Access version of the Tenable Vulnerability Management User Guide or contact your Tenable representative.
Tenable is pleased to announce support for Common Vulnerability Scoring System Version 4.0 (CVSSv4) in Tenable Vulnerability Management.
To support this update, new filters and columns appear in the following areas:
On the Findings workbench.
In Explore, on the new Findings page.
On the Vulnerability Intelligence Overview page, in the CVEs, Findings, and My Affected Assets tabs.
In Exposure Response, under My Findings and Affected Assets and Combinations
To learn more about CVSSv4, see Common Vulnerability Scoring System Version 4.0 on the FIRST website.
Create a Google Cloud Platform connector with Workload Identity Federation authentication to discover Google Cloud Platform assets and import them to Tenable Vulnerability Management. For more information, see Create a GCP Connector with Workload Identity Federation Authentication.
Tenable has made the following enhancements to custom widgets for host audit data:
You can now choose these additional chart types for custom Host Audit widgets:
Multi-series bar
Multi-series column
Stacked bar
Stacked column
Matrix
To learn more, see Create a Custom Widget in the Tenable Vulnerability Management User Guide or contact your Tenable representative.
You can now view all IPV4 addresses for an affected asset on the Findings workbench as follows:
In a new All IP4v4 Addresses column.
On the Asset Details page under Asset Information.
When using findings filters.
To learn more, see Vulnerability Details in the Tenable Vulnerability Management User Guide.
Tenable is pleased to announce a new way to export your vulnerability data: Tenable Data Stream. With this new feature, you connect an AWS S3 bucket to Tenable Vulnerability Management, which then continuously sends your vulnerability data to your AWS bucket in JSON format. This feature is an alternative to the Tenable export APIs.
Once configured, Tenable Data Stream sends the following file types:
File Type | Description |
---|---|
Assets payload |
New, updated, or deleted assets. |
Findings payload |
New or updated findings. |
Tags payload | New, updated, or deleted asset tags. |
Manifest | Event logs for the payload files sent to your AWS bucket. |
For comprehensive documentation, see Tenable Data Stream in the Tenable Vulnerability Management User Guide.
Tenable Vulnerability Management now supports the ability to recast Host Audit data using custom roles. This means that custom role users can recast/accept Tenable Vulnerability Management, Tenable Web App Scanning, and Host Audit findings.
For more information, see Custom Roles in the Tenable Vulnerability Management User Guide.
Copyright © 2025 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other products or services are trademarks of their respective owners.