Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2350: Insertion of Sensitive Information into Log File in Tanium Interact

0
Medium
VulnerabilityCVE-2026-2350cvecve-2026-2350
Published: Thu Feb 19 2026 (02/19/2026, 23:10:33 UTC)
Source: CVE Database V5
Vendor/Project: Tanium
Product: Interact

Description

Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:29:40 UTC

Technical Analysis

CVE-2026-2350 is a vulnerability identified in Tanium Interact, specifically affecting versions 3.2.0 and 3.5.0. The issue involves the insertion of sensitive information into log files, which can lead to unauthorized exposure of confidential data. Tanium Interact is a platform widely used for endpoint management, threat detection, and response in enterprise environments. The vulnerability allows an attacker with network access and low privileges (PR:L) to remotely exploit the flaw without requiring user interaction (UI:N). The attack vector is network-based (AV:N), and the vulnerability does not require complex attack conditions (AC:L). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. This means sensitive data such as credentials, tokens, or other private information may be logged in plaintext or otherwise accessible in logs, potentially allowing attackers or unauthorized users to retrieve this information if they gain access to the log files. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.5 reflects the moderate risk posed by this vulnerability. The lack of user interaction and the network attack vector increase the likelihood of exploitation in environments where Tanium Interact is deployed. Tanium has addressed this vulnerability, but no direct patch links are provided in the source information, indicating organizations should monitor vendor advisories closely. Proper log management and access controls are critical to mitigating the risk until patches are applied.

Potential Impact

The primary impact of CVE-2026-2350 is the unauthorized disclosure of sensitive information through log files. This can lead to significant confidentiality breaches, including exposure of credentials, session tokens, or other sensitive operational data. Such exposure can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration within an organization's network. Since Tanium Interact is used for endpoint management and security operations, compromised sensitive data could undermine an organization's security posture and incident response capabilities. The vulnerability does not affect system integrity or availability directly, but the confidentiality breach alone can have severe consequences, especially in regulated industries or organizations handling sensitive data. The medium severity rating reflects a balance between the ease of exploitation and the impact scope. Organizations worldwide relying on Tanium Interact for endpoint security are at risk, particularly those with remote or network-exposed management consoles. The absence of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

1. Apply official patches or updates from Tanium as soon as they become available to remediate the vulnerability. 2. Restrict access to log files containing sensitive information by implementing strict file permissions and access controls, ensuring only authorized personnel and systems can read them. 3. Implement network segmentation and firewall rules to limit network access to Tanium Interact management interfaces and logging systems, reducing exposure to potential attackers. 4. Enable and monitor audit logging for access to log files to detect unauthorized attempts to read sensitive information. 5. Review and sanitize logging configurations to minimize logging of sensitive data where possible, following the principle of least privilege and data minimization. 6. Conduct regular security assessments and penetration testing focused on log file security and access controls within the Tanium environment. 7. Educate security and IT teams on the risks associated with sensitive data exposure in logs and best practices for secure log management. 8. Consider deploying additional security controls such as encryption for log files at rest and in transit to protect sensitive information from unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Tanium
Date Reserved
2026-02-11T16:04:36.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699799f2d7880ec89b3a60c1

Added to database: 2/19/2026, 11:17:06 PM

Last enriched: 3/7/2026, 9:29:40 PM

Last updated: 4/6/2026, 10:40:54 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses