Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15334: Incorrect Default Permissions in Tanium Threat Response

0
Medium
VulnerabilityCVE-2025-15334cvecve-2025-15334
Published: Thu Feb 05 2026 (02/05/2026, 18:18:04 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Threat Response

Description

Tanium addressed an information disclosure vulnerability in Threat Response.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:06:51 UTC

Technical Analysis

CVE-2025-15334 is an information disclosure vulnerability identified in Tanium Threat Response, a widely used endpoint detection and response (EDR) platform. The vulnerability arises from incorrect default permissions configured in versions 4.5.0, 4.6.0, and 4.9.0, which allow users with low-level privileges and network access to read sensitive information that should otherwise be protected. The flaw does not require user interaction and can be exploited remotely over the network, increasing its risk profile. However, exploitation requires at least some level of privileges (PR:L), which limits the attack surface to authenticated or semi-trusted users or systems. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. Tanium has published the CVE with a CVSS 3.1 base score of 4.3, categorizing it as medium severity. No public exploit code or active exploitation has been reported to date. The root cause is the misconfiguration of default permissions, which can be addressed by applying patches or manually adjusting access controls. Tanium Threat Response is often deployed in enterprise environments for threat detection and response, making the confidentiality impact significant in contexts where sensitive data is handled. The vulnerability highlights the importance of secure default configurations in security products themselves, as misconfigurations can undermine overall security posture.

Potential Impact

For European organizations, the primary impact of CVE-2025-15334 is the potential unauthorized disclosure of sensitive information managed or monitored by Tanium Threat Response. This could include endpoint telemetry, security event data, or other confidential operational details. While the vulnerability does not allow system takeover or denial of service, the exposure of sensitive data can aid attackers in reconnaissance or lateral movement within networks. Organizations in sectors such as finance, healthcare, critical infrastructure, and government are particularly at risk due to the sensitive nature of their data and regulatory requirements for confidentiality. The medium severity rating reflects a moderate risk that can escalate if combined with other vulnerabilities or insider threats. Since the vulnerability requires some privilege level and network access, the risk is higher in environments with weak internal segmentation or insufficient access controls. Failure to address this vulnerability could lead to compliance issues under GDPR and other European data protection regulations if personal or sensitive data is exposed.

Mitigation Recommendations

European organizations using Tanium Threat Response versions 4.5.0, 4.6.0, or 4.9.0 should immediately review and adjust default permissions to ensure least privilege principles are enforced. Applying any available patches or updates from Tanium is the primary mitigation step. If patches are not yet available, administrators should manually audit and restrict access controls on Threat Response components to prevent unauthorized read access. Network segmentation should be implemented to limit access to Tanium management interfaces to trusted administrators and systems only. Monitoring and logging of access to Threat Response data should be enhanced to detect anomalous or unauthorized access attempts. Additionally, organizations should conduct internal audits to identify any potential data exposure resulting from this vulnerability. Employee training on privilege management and secure configuration practices can help prevent similar issues. Finally, integrating Tanium Threat Response with broader security information and event management (SIEM) systems can improve detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:13:33.075Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69859ff7f9fa50a62fe9e82b

Added to database: 2/6/2026, 8:01:59 AM

Last enriched: 2/6/2026, 8:06:51 AM

Last updated: 2/8/2026, 10:50:33 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats