Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15317: Allocation of Resources Without Limits or Throttling in Tanium Tanium Server

0
Medium
VulnerabilityCVE-2025-15317cvecve-2025-15317
Published: Mon Feb 09 2026 (02/09/2026, 21:43:41 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Tanium Server

Description

CVE-2025-15317 is a medium-severity vulnerability in Tanium Server versions 7. 4. 6. 0, 7. 5. 6. 0, 7. 6. 2. 0, and 7.

AI-Powered Analysis

AILast updated: 02/09/2026, 22:16:09 UTC

Technical Analysis

CVE-2025-15317 is a vulnerability identified in Tanium Server, a widely used endpoint management and security platform. The issue arises from the server's failure to impose limits or throttling on resource allocation requests, allowing an attacker with low privileges to trigger uncontrolled consumption of system resources such as CPU, memory, or network bandwidth. This can lead to denial of service (DoS) conditions, where legitimate users and processes are starved of resources, causing service degradation or complete outage. The vulnerability affects multiple versions of Tanium Server (7.4.6.0, 7.5.6.0, 7.6.2.0, and 7.6.4.0) and can be exploited remotely over the network without requiring user interaction. The CVSS v3.1 base score is 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting availability only. No known exploits have been reported in the wild as of the publication date. The root cause is the absence of resource allocation controls, which could be mitigated by implementing throttling mechanisms or resource quotas within the server software. Tanium has addressed this vulnerability in subsequent patches, although specific patch links were not provided in the source data.

Potential Impact

For European organizations, the primary impact of CVE-2025-15317 is the risk of denial of service affecting Tanium Server availability. Tanium is often deployed in large enterprises and critical infrastructure sectors for endpoint management, threat detection, and response. A successful exploitation could disrupt security operations, delay incident response, and impair endpoint visibility, increasing the risk exposure to other threats. Organizations relying heavily on Tanium for real-time monitoring and control may experience operational downtime, potentially affecting business continuity and compliance with regulatory requirements such as GDPR. The medium severity rating indicates that while confidentiality and integrity are not directly compromised, the availability impact can still have significant operational consequences. Additionally, the requirement for low privileges means that insider threats or compromised accounts could exploit this vulnerability more easily. The absence of known active exploits provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Apply official patches from Tanium as soon as they become available to address the resource allocation flaw. 2. Implement network-level rate limiting and traffic shaping to restrict excessive requests to Tanium Server endpoints. 3. Monitor server resource utilization closely using performance monitoring tools to detect abnormal spikes indicative of exploitation attempts. 4. Enforce strict access controls and privilege management to minimize the number of users with permissions that could trigger resource-intensive operations. 5. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspicious request patterns targeting Tanium Server. 6. Conduct regular security audits and vulnerability assessments focusing on endpoint management infrastructure. 7. Develop and test incident response plans that include scenarios involving denial of service on critical security management systems. 8. Engage with Tanium support and subscribe to security advisories for timely updates and guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:12:57.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a592c4b57a58fa173fd97

Added to database: 2/9/2026, 10:01:16 PM

Last enriched: 2/9/2026, 10:16:09 PM

Last updated: 2/10/2026, 12:25:27 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats