Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15332: Insertion of Sensitive Information into Log File in Tanium Threat Response

0
Medium
VulnerabilityCVE-2025-15332cvecve-2025-15332
Published: Thu Feb 05 2026 (02/05/2026, 18:22:45 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Threat Response

Description

Tanium addressed an information disclosure vulnerability in Threat Response.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:06:11 UTC

Technical Analysis

CVE-2025-15332 is an information disclosure vulnerability identified in Tanium Threat Response, a widely used endpoint detection and response (EDR) platform. The flaw arises from the improper handling of sensitive information, which is inserted into log files without adequate sanitization or protection. This can lead to exposure of confidential data such as credentials, system details, or security telemetry within logs accessible to users or processes without sufficient privileges. The vulnerability affects versions 4.5.0, 4.6.0, and 4.9.0 of the product. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N), the attack can be executed remotely over the network with low complexity but requires the attacker to have high privileges on the system, such as administrative or elevated user rights. No user interaction is needed, and the scope remains unchanged, meaning the vulnerability affects only the vulnerable component. The impact is primarily on confidentiality, as the integrity and availability of the system are not compromised. Although no exploits are currently known in the wild, the presence of sensitive data in logs can facilitate further attacks if an adversary gains access to these logs. Tanium has addressed this vulnerability, but patch links are not provided in the data, indicating organizations should monitor vendor advisories closely. Proper log management and access controls are critical to mitigating risk until patches are applied.

Potential Impact

For European organizations, the primary impact of CVE-2025-15332 is the potential exposure of sensitive information through log files, which can lead to unauthorized disclosure of confidential data. This could compromise internal security postures, facilitate lateral movement by attackers, or leak sensitive operational details. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Tanium Threat Response for endpoint security are at heightened risk. The vulnerability requires high privileges to exploit, so insider threats or attackers who have already gained elevated access pose the greatest danger. While the vulnerability does not affect system integrity or availability, the confidentiality breach can undermine trust, lead to regulatory non-compliance (e.g., GDPR), and cause reputational damage. Given the network attack vector, remote attackers with elevated access could exploit this vulnerability to harvest sensitive data from logs, increasing the risk of further compromise.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Apply official patches from Tanium as soon as they become available to remediate the vulnerability. 2) Restrict access to log files generated by Tanium Threat Response to only those users and processes that absolutely require it, using strict file permissions and access control lists. 3) Implement robust monitoring and alerting on log access and unusual activities to detect potential unauthorized access attempts. 4) Conduct regular audits of log contents to identify any inadvertent sensitive data exposure. 5) Employ network segmentation and least privilege principles to limit the ability of attackers to gain high privileges required for exploitation. 6) Educate system administrators and security teams about the risk of sensitive data in logs and the importance of secure log management. 7) Consider encrypting log files at rest to add an additional layer of protection. 8) Maintain up-to-date inventories of affected Tanium product versions deployed within the environment to ensure timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:13:31.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69859ff7f9fa50a62fe9e825

Added to database: 2/6/2026, 8:01:59 AM

Last enriched: 2/6/2026, 8:06:11 AM

Last updated: 2/7/2026, 5:55:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats