CVE-2025-15334: Incorrect Default Permissions in Tanium Threat Response
Tanium addressed an information disclosure vulnerability in Threat Response.
AI Analysis
Technical Summary
CVE-2025-15334 is an information disclosure vulnerability identified in Tanium Threat Response, a widely used endpoint detection and response (EDR) platform. The vulnerability arises from incorrect default permissions configured in versions 4.5.0, 4.6.0, and 4.9.0, which allow users with low-level privileges and network access to read sensitive information that should otherwise be protected. The flaw does not require user interaction and can be exploited remotely over the network, increasing its risk profile. However, exploitation requires at least some level of privileges (PR:L), which limits the attack surface to authenticated or semi-trusted users or systems. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. Tanium has published the CVE with a CVSS 3.1 base score of 4.3, categorizing it as medium severity. No public exploit code or active exploitation has been reported to date. The root cause is the misconfiguration of default permissions, which can be addressed by applying patches or manually adjusting access controls. Tanium Threat Response is often deployed in enterprise environments for threat detection and response, making the confidentiality impact significant in contexts where sensitive data is handled. The vulnerability highlights the importance of secure default configurations in security products themselves, as misconfigurations can undermine overall security posture.
Potential Impact
For European organizations, the primary impact of CVE-2025-15334 is the potential unauthorized disclosure of sensitive information managed or monitored by Tanium Threat Response. This could include endpoint telemetry, security event data, or other confidential operational details. While the vulnerability does not allow system takeover or denial of service, the exposure of sensitive data can aid attackers in reconnaissance or lateral movement within networks. Organizations in sectors such as finance, healthcare, critical infrastructure, and government are particularly at risk due to the sensitive nature of their data and regulatory requirements for confidentiality. The medium severity rating reflects a moderate risk that can escalate if combined with other vulnerabilities or insider threats. Since the vulnerability requires some privilege level and network access, the risk is higher in environments with weak internal segmentation or insufficient access controls. Failure to address this vulnerability could lead to compliance issues under GDPR and other European data protection regulations if personal or sensitive data is exposed.
Mitigation Recommendations
European organizations using Tanium Threat Response versions 4.5.0, 4.6.0, or 4.9.0 should immediately review and adjust default permissions to ensure least privilege principles are enforced. Applying any available patches or updates from Tanium is the primary mitigation step. If patches are not yet available, administrators should manually audit and restrict access controls on Threat Response components to prevent unauthorized read access. Network segmentation should be implemented to limit access to Tanium management interfaces to trusted administrators and systems only. Monitoring and logging of access to Threat Response data should be enhanced to detect anomalous or unauthorized access attempts. Additionally, organizations should conduct internal audits to identify any potential data exposure resulting from this vulnerability. Employee training on privilege management and secure configuration practices can help prevent similar issues. Finally, integrating Tanium Threat Response with broader security information and event management (SIEM) systems can improve detection of exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-15334: Incorrect Default Permissions in Tanium Threat Response
Description
Tanium addressed an information disclosure vulnerability in Threat Response.
AI-Powered Analysis
Technical Analysis
CVE-2025-15334 is an information disclosure vulnerability identified in Tanium Threat Response, a widely used endpoint detection and response (EDR) platform. The vulnerability arises from incorrect default permissions configured in versions 4.5.0, 4.6.0, and 4.9.0, which allow users with low-level privileges and network access to read sensitive information that should otherwise be protected. The flaw does not require user interaction and can be exploited remotely over the network, increasing its risk profile. However, exploitation requires at least some level of privileges (PR:L), which limits the attack surface to authenticated or semi-trusted users or systems. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. Tanium has published the CVE with a CVSS 3.1 base score of 4.3, categorizing it as medium severity. No public exploit code or active exploitation has been reported to date. The root cause is the misconfiguration of default permissions, which can be addressed by applying patches or manually adjusting access controls. Tanium Threat Response is often deployed in enterprise environments for threat detection and response, making the confidentiality impact significant in contexts where sensitive data is handled. The vulnerability highlights the importance of secure default configurations in security products themselves, as misconfigurations can undermine overall security posture.
Potential Impact
For European organizations, the primary impact of CVE-2025-15334 is the potential unauthorized disclosure of sensitive information managed or monitored by Tanium Threat Response. This could include endpoint telemetry, security event data, or other confidential operational details. While the vulnerability does not allow system takeover or denial of service, the exposure of sensitive data can aid attackers in reconnaissance or lateral movement within networks. Organizations in sectors such as finance, healthcare, critical infrastructure, and government are particularly at risk due to the sensitive nature of their data and regulatory requirements for confidentiality. The medium severity rating reflects a moderate risk that can escalate if combined with other vulnerabilities or insider threats. Since the vulnerability requires some privilege level and network access, the risk is higher in environments with weak internal segmentation or insufficient access controls. Failure to address this vulnerability could lead to compliance issues under GDPR and other European data protection regulations if personal or sensitive data is exposed.
Mitigation Recommendations
European organizations using Tanium Threat Response versions 4.5.0, 4.6.0, or 4.9.0 should immediately review and adjust default permissions to ensure least privilege principles are enforced. Applying any available patches or updates from Tanium is the primary mitigation step. If patches are not yet available, administrators should manually audit and restrict access controls on Threat Response components to prevent unauthorized read access. Network segmentation should be implemented to limit access to Tanium management interfaces to trusted administrators and systems only. Monitoring and logging of access to Threat Response data should be enhanced to detect anomalous or unauthorized access attempts. Additionally, organizations should conduct internal audits to identify any potential data exposure resulting from this vulnerability. Employee training on privilege management and secure configuration practices can help prevent similar issues. Finally, integrating Tanium Threat Response with broader security information and event management (SIEM) systems can improve detection of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Tanium
- Date Reserved
- 2025-12-29T23:13:33.075Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69859ff7f9fa50a62fe9e82b
Added to database: 2/6/2026, 8:01:59 AM
Last enriched: 2/6/2026, 8:06:51 AM
Last updated: 2/8/2026, 10:50:33 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2147: Information Disclosure in Tenda AC21
MediumCVE-2026-2146: Unrestricted Upload in guchengwuyue yshopmall
MediumCVE-2026-2145: Cross Site Scripting in cym1102 nginxWebUI
MediumCVE-2026-2143: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2142: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.