Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15335: Incorrect Default Permissions in Tanium Threat Response

0
Medium
VulnerabilityCVE-2025-15335cvecve-2025-15335
Published: Thu Feb 05 2026 (02/05/2026, 18:17:28 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Threat Response

Description

Tanium addressed an information disclosure vulnerability in Threat Response.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:07:05 UTC

Technical Analysis

CVE-2025-15335 is a vulnerability identified in Tanium Threat Response, a security and endpoint management product widely used for threat detection and response. The root cause is incorrect default permissions configured in versions 4.5.0, 4.6.0, and 4.9.0, which lead to an information disclosure issue. Specifically, the vulnerability allows an attacker with low privileges (PR:L) to remotely (AV:N) access sensitive information without requiring user interaction (UI:N). The vulnerability does not impact the integrity or availability of the system but compromises confidentiality. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) reflects that the attack complexity is low, and the scope remains unchanged. Although no known exploits have been reported in the wild, the presence of this vulnerability poses a risk of unauthorized data exposure, potentially leaking sensitive operational or security-related information. Tanium has acknowledged and addressed the issue, but the provided data does not include direct patch links, indicating organizations must monitor vendor communications for updates. The vulnerability highlights the importance of secure default configurations in security tools, as misconfigurations can undermine the overall security posture.

Potential Impact

For European organizations, the primary impact of CVE-2025-15335 is the potential unauthorized disclosure of sensitive information managed or monitored by Tanium Threat Response. This could include endpoint telemetry, threat intelligence data, or internal security configurations, which if exposed, may aid attackers in further targeting or evading defenses. Confidentiality breaches can lead to compliance issues under GDPR, especially if personal or sensitive data is involved. While the vulnerability does not directly affect system integrity or availability, the leakage of security-related information can weaken an organization's defensive capabilities. Enterprises relying heavily on Tanium for endpoint security and incident response may face increased risk of reconnaissance by threat actors. The medium severity rating suggests a moderate risk level, but the ease of remote exploitation without user interaction elevates the urgency for remediation. Organizations in regulated sectors such as finance, healthcare, and critical infrastructure in Europe must be particularly vigilant to avoid reputational damage and regulatory penalties.

Mitigation Recommendations

1. Monitor Tanium’s official security advisories and apply patches or updates as soon as they are released to address CVE-2025-15335. 2. Conduct an immediate audit of permission settings within Tanium Threat Response to identify and correct any overly permissive configurations, ensuring the principle of least privilege is enforced. 3. Restrict network access to Tanium management interfaces to trusted administrative networks and implement strong authentication controls to limit exposure. 4. Employ network segmentation to isolate Tanium servers from general user networks, reducing the attack surface. 5. Enhance monitoring and logging around Tanium Threat Response activities to detect any unusual access patterns or attempts to exploit permission weaknesses. 6. Educate security teams about this vulnerability to ensure rapid response and containment if suspicious activity is detected. 7. Consider compensating controls such as additional encryption of sensitive data within Tanium or use of endpoint protection layers to mitigate potential data exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2025-12-29T23:13:47.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69859ff7f9fa50a62fe9e82e

Added to database: 2/6/2026, 8:01:59 AM

Last enriched: 2/6/2026, 8:07:05 AM

Last updated: 2/7/2026, 6:12:11 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats