Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15319: Improper Link Resolution Before File Access ('Link Following') in Tanium Patch Endpoint Tools

0
High
VulnerabilityCVE-2025-15319cvecve-2025-15319
Published: Mon Feb 09 2026 (02/09/2026, 22:52:32 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Patch Endpoint Tools

Description

CVE-2025-15319 is a high-severity local privilege escalation vulnerability in Tanium Patch Endpoint Tools affecting multiple versions. The flaw arises from improper link resolution before file access, allowing an attacker with limited privileges to escalate their rights on the system. Exploitation requires local access and no user interaction, potentially leading to full confidentiality, integrity, and availability compromise. Although no known exploits are currently in the wild, the vulnerability's impact is significant due to the critical nature of Tanium's endpoint management tools. European organizations using affected versions should prioritize patching to mitigate risk. Countries with high adoption of Tanium solutions and critical infrastructure sectors are most at risk. Mitigations include applying vendor patches promptly, restricting local user permissions, and monitoring for suspicious local activity. The vulnerability carries a CVSS score of 7. 8, reflecting its high severity and ease of exploitation given local access. Defenders should focus on rapid detection and remediation to prevent privilege escalation attacks leveraging this flaw.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:29:53 UTC

Technical Analysis

CVE-2025-15319 is a local privilege escalation vulnerability identified in Tanium Patch Endpoint Tools, impacting versions 3.17.0, 10.1.0, 10.7.0, 10.9.0, and 10.11.0. The vulnerability stems from improper link resolution before file access, commonly referred to as 'link following.' This means that when the software attempts to access files, it does not correctly validate symbolic or hard links, potentially allowing an attacker to redirect file operations to unintended locations. An attacker with local access and limited privileges can exploit this flaw to escalate their privileges by manipulating file system links, thereby gaining higher system rights. The CVSS v3.1 score of 7.8 indicates a high severity level, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation can lead to full system compromise. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a critical concern for organizations relying on Tanium's endpoint management tools. Tanium Patch Endpoint Tools are widely used for patch management and endpoint security, making this vulnerability particularly dangerous if exploited, as it could undermine the security posture of managed endpoints.

Potential Impact

For European organizations, the impact of CVE-2025-15319 is significant due to the widespread use of Tanium Patch Endpoint Tools in enterprise environments for patch management and endpoint security. Successful exploitation allows attackers with local access to escalate privileges, potentially leading to full control over affected systems. This can result in unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further attacks such as ransomware or data exfiltration. Sectors such as finance, healthcare, energy, and government, which rely heavily on endpoint management solutions, are particularly at risk. The high confidentiality, integrity, and availability impact means that exploitation could compromise critical infrastructure and sensitive information, leading to regulatory and compliance issues under GDPR and other European data protection laws. Additionally, the local attack vector implies insider threats or attackers who have already gained initial footholds could leverage this vulnerability to deepen their access, increasing the overall risk profile for European organizations.

Mitigation Recommendations

To mitigate CVE-2025-15319, European organizations should immediately apply the patches provided by Tanium for the affected versions of Patch Endpoint Tools. If patches are not yet available, organizations should restrict local user permissions to the minimum necessary, especially limiting the ability to create or manipulate symbolic or hard links. Implement strict access controls and monitoring on endpoints to detect unusual file system activities indicative of link manipulation. Employ endpoint detection and response (EDR) solutions to identify and respond to privilege escalation attempts. Regularly audit and harden endpoint configurations to reduce the attack surface. Additionally, segment networks to limit lateral movement from compromised endpoints and enforce the principle of least privilege for all users and processes. Organizations should also educate IT staff about this vulnerability and monitor threat intelligence feeds for any emerging exploit attempts. Finally, maintain robust incident response plans to quickly contain and remediate any exploitation events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:12:58.866Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a673b4b57a58fa1774cd0

Added to database: 2/9/2026, 11:01:15 PM

Last enriched: 2/17/2026, 9:29:53 AM

Last updated: 3/26/2026, 7:53:07 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses