Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15314: Improper Link Resolution Before File Access ('Link Following') in Tanium end-user-cx

0
Medium
VulnerabilityCVE-2025-15314cvecve-2025-15314
Published: Mon Feb 09 2026 (02/09/2026, 23:05:16 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: end-user-cx

Description

CVE-2025-15314 is a medium severity vulnerability in Tanium's end-user-cx product that allows an authenticated local attacker to cause arbitrary file deletion due to improper link resolution before file access. The flaw arises from 'link following' issues where symbolic or hard links are not properly handled, enabling an attacker with low privileges to delete files they should not be able to. Exploitation does not require user interaction but does require local privileges. The vulnerability impacts versions 1. 4. 0, 1. 6. 0, and 1. 8. 0 of end-user-cx.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:32:16 UTC

Technical Analysis

CVE-2025-15314 is an arbitrary file deletion vulnerability found in Tanium's end-user-cx product, specifically affecting versions 1.4.0, 1.6.0, and 1.8.0. The root cause is improper link resolution before file access, commonly referred to as a 'link following' vulnerability. This occurs when the software fails to correctly handle symbolic or hard links, allowing an attacker to manipulate the file system path resolution process. An attacker with low privileges and local access can exploit this flaw to delete arbitrary files on the system, potentially impacting the integrity of critical files or configurations. The vulnerability does not affect confidentiality or availability directly but poses a significant risk to data integrity. The CVSS v3.1 score is 5.5 (medium severity), reflecting that exploitation requires local privileges (AV:L), low attack complexity (AC:L), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is on integrity (I:H) without affecting confidentiality or availability. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a concern for environments where Tanium end-user-cx is deployed, especially in enterprise and critical infrastructure settings. Tanium has published the vulnerability and presumably released patches, though no direct patch links are provided in the data. Organizations should verify their versions and apply updates promptly to mitigate risks.

Potential Impact

For European organizations, the primary impact of CVE-2025-15314 lies in the potential for unauthorized deletion of files by an attacker with local access and low privileges. This can lead to disruption of endpoint management operations, loss of critical configuration files, or tampering with system integrity. In sectors such as finance, healthcare, energy, and government, where Tanium's endpoint management solutions are often used, such integrity compromises could result in operational downtime, compliance violations, and increased risk of further exploitation. Although the vulnerability does not directly impact confidentiality or availability, the ability to delete arbitrary files can indirectly cause service interruptions or data loss. The requirement for local privileges limits remote exploitation but does not eliminate risk, especially in environments where endpoint security is lax or insider threats exist. European organizations with large distributed endpoint fleets using affected versions should consider this vulnerability a moderate risk that warrants timely remediation to maintain operational security and compliance with data protection regulations.

Mitigation Recommendations

To mitigate CVE-2025-15314, European organizations should: 1) Immediately identify all instances of Tanium end-user-cx running affected versions (1.4.0, 1.6.0, 1.8.0) through asset management and software inventory tools. 2) Apply the official patches or updates provided by Tanium as soon as they become available; if patches are not yet released, contact Tanium support for guidance or temporary workarounds. 3) Restrict local access to systems running end-user-cx to trusted personnel only, minimizing the risk of exploitation by low-privilege users. 4) Implement strict endpoint security controls, including application whitelisting and privilege management, to prevent unauthorized local code execution or escalation. 5) Monitor system logs and file integrity monitoring tools for unusual file deletions or suspicious link manipulations. 6) Educate IT and security teams about the vulnerability specifics to ensure rapid detection and response. 7) Consider network segmentation and enhanced access controls around critical endpoints to reduce the attack surface. These steps go beyond generic advice by focusing on controlling local access and monitoring file system integrity specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:12:54.874Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a6abf4b57a58fa177cfba

Added to database: 2/9/2026, 11:16:15 PM

Last enriched: 2/17/2026, 9:32:16 AM

Last updated: 3/27/2026, 4:20:03 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses