Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15288: Incorrect Authorization in Tanium Interact

0
Low
VulnerabilityCVE-2025-15288cvecve-2025-15288
Published: Thu Jan 29 2026 (01/29/2026, 20:10:48 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Interact

Description

Tanium addressed an improper access controls vulnerability in Interact.

AI-Powered Analysis

AILast updated: 01/29/2026, 20:42:07 UTC

Technical Analysis

CVE-2025-15288 identifies an improper access control vulnerability in Tanium Interact version 3.5.90. Tanium Interact is a platform used for endpoint management and security operations, enabling querying and interaction with managed devices. The vulnerability arises from incorrect authorization checks that allow a user with low privileges to access certain resources or data that should be restricted. According to the CVSS v3.1 vector (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N), exploitation requires network access with low privileges and high attack complexity, but no user interaction. The impact is limited to a low confidentiality loss, with no impact on integrity or availability. Tanium has acknowledged the issue and published it in the CVE database, but no public exploits have been reported. The vulnerability affects version 3.5.90, and organizations running this version should monitor for patches or updates from Tanium. The flaw could potentially allow unauthorized data access within the platform, which may expose sensitive endpoint information or operational details, but the scope is limited by the required privileges and complexity.

Potential Impact

For European organizations, the impact of CVE-2025-15288 is relatively low due to the limited confidentiality impact and the requirement for an attacker to have low privileges and network access. However, Tanium Interact is often used in large enterprises and critical infrastructure sectors for endpoint management and security operations, so any unauthorized access could reveal sensitive operational data or endpoint details. This could aid an attacker in reconnaissance or lateral movement if combined with other vulnerabilities. The lack of integrity or availability impact means system operations are not directly disrupted. Organizations in regulated sectors with strict data protection requirements (e.g., finance, healthcare) should consider the confidentiality implications carefully. Overall, the vulnerability represents a moderate operational risk but not an immediate critical threat.

Mitigation Recommendations

1. Apply patches or updates from Tanium as soon as they become available to address the improper access control issue. 2. Review and tighten role-based access controls (RBAC) within Tanium Interact to ensure users have the minimum necessary privileges. 3. Monitor network access to Tanium Interact servers, restricting access to trusted IP ranges and using network segmentation to limit exposure. 4. Enable detailed logging and audit trails for user actions within Tanium Interact to detect any unauthorized access attempts. 5. Conduct regular security assessments and penetration tests focusing on access control mechanisms in endpoint management platforms. 6. Educate administrators and users on the importance of credential security and monitoring for suspicious activity. 7. Consider deploying additional endpoint detection and response (EDR) tools to detect lateral movement attempts that could leverage this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:02:12.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697bc2c4ac06320222b51cfa

Added to database: 1/29/2026, 8:27:48 PM

Last enriched: 1/29/2026, 8:42:07 PM

Last updated: 1/29/2026, 10:06:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats