Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2350: Insertion of Sensitive Information into Log File in Tanium Interact

0
Medium
VulnerabilityCVE-2026-2350cvecve-2026-2350
Published: Thu Feb 19 2026 (02/19/2026, 23:10:33 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Interact

Description

Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.

AI-Powered Analysis

AILast updated: 02/19/2026, 23:32:34 UTC

Technical Analysis

CVE-2026-2350 is a vulnerability identified in Tanium Interact, a widely used endpoint management and security platform, specifically affecting versions 3.2.0 and 3.5.0. The vulnerability involves the insertion of sensitive information into log files, which can lead to unauthorized disclosure of confidential data. The flaw arises because the application logs sensitive details without adequate sanitization or access controls, potentially exposing data such as authentication tokens, user credentials, or other sensitive operational information. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows that the vulnerability can be exploited remotely over the network with low attack complexity and requires low privileges but no user interaction. The impact is primarily on confidentiality, with no direct effect on integrity or availability. No known exploits have been reported in the wild, but the risk remains significant due to the sensitive nature of the leaked information. Tanium Interact is used globally by enterprises for endpoint security and management, making this vulnerability relevant to organizations that rely on these versions. The vulnerability was reserved and published in February 2026, and while no patch links are provided in the data, it is expected that Tanium will release updates to remediate the issue. Proper log management and access control are critical to mitigating the risk until patches are applied.

Potential Impact

The primary impact of CVE-2026-2350 is the unauthorized disclosure of sensitive information through log files, which can compromise confidentiality. Exposure of sensitive data such as authentication tokens or credentials could enable attackers to escalate privileges, move laterally within networks, or conduct further attacks. Although the vulnerability does not affect system integrity or availability directly, the confidentiality breach can lead to significant operational and reputational damage. Organizations using affected Tanium Interact versions may face increased risk of data leakage, compliance violations, and potential regulatory penalties. The medium severity rating reflects the balance between the ease of exploitation (remote, low complexity, low privileges) and the impact limited to confidentiality. Since no user interaction is required, attackers can automate exploitation attempts, increasing the threat surface. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a concern for organizations with sensitive environments or high-value targets.

Mitigation Recommendations

1. Apply vendor patches promptly once Tanium releases updates addressing CVE-2026-2350. Monitor Tanium’s official channels for patch announcements. 2. Restrict access to log files containing sensitive information by enforcing strict file permissions and access controls, limiting log visibility to authorized personnel only. 3. Implement log sanitization and filtering to prevent sensitive data from being recorded in logs. Review and adjust logging configurations to minimize sensitive data capture. 4. Monitor logs for unusual access patterns or attempts to retrieve sensitive information, using security information and event management (SIEM) tools. 5. Employ network segmentation and least privilege principles to reduce the risk of attackers exploiting low-privilege accounts remotely. 6. Conduct regular security audits and vulnerability assessments focusing on endpoint management tools like Tanium Interact. 7. Educate system administrators and security teams about the risks of sensitive data exposure in logs and best practices for secure log management. 8. Consider deploying endpoint detection and response (EDR) solutions to detect suspicious activities related to log file access or data exfiltration attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2026-02-11T16:04:36.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699799f2d7880ec89b3a60c1

Added to database: 2/19/2026, 11:17:06 PM

Last enriched: 2/19/2026, 11:32:34 PM

Last updated: 2/20/2026, 10:56:28 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats