Search criteria
31 vulnerabilities by tanium
CVE-2025-15311 (GCVE-0-2025-15311)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:26 – Updated: 2026-02-05 18:26
VLAI?
Title
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
Summary
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
Severity ?
7.8 (High)
CWE
- CWE-150 - Improper Neutralization of Escape, Meta, or Control Sequences
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Tanium Appliance |
Affected:
1.8.3.0 , < 1.8.3.0146
(custom)
Affected: 1.8.4.0 , < 1.8.4.0149 (custom) Affected: 1.8.5.0 , < 1.8.5.0212 (custom) cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.4.0148:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.5.0211:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.4.0148:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.5.0211:*:*:*:*:*:*:*"
],
"product": "Tanium Appliance",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.8.3.0146",
"status": "affected",
"version": "1.8.3.0",
"versionType": "custom"
},
{
"lessThan": "1.8.4.0149",
"status": "affected",
"version": "1.8.4.0",
"versionType": "custom"
},
{
"lessThan": "1.8.5.0212",
"status": "affected",
"version": "1.8.5.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:12:52.865Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-150",
"description": "Improper Neutralization of Escape, Meta, or Control Sequences",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:26:23.251Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-002",
"url": "https://security.tanium.com/TAN-2025-002"
}
],
"title": "Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15311",
"datePublished": "2026-02-05T18:26:23.251Z",
"dateReserved": "2025-12-29T23:12:53.054Z",
"dateUpdated": "2026-02-05T18:26:23.251Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15312 (GCVE-0-2025-15312)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:26 – Updated: 2026-02-05 18:26
VLAI?
Title
Tanium addressed an improper output sanitization vulnerability in TanOS.
Summary
Tanium addressed an improper output sanitization vulnerability in Tanium Appliance.
Severity ?
6.6 (Medium)
CWE
- CWE-116 - Improper Encoding or Escaping of Output
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Tanium Appliance |
Affected:
1.8.3.0 , < 1.8.3.0146
(custom)
Affected: 1.8.4.0 , < 1.8.4.0157 (custom) cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.4.0156:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.4.0156:*:*:*:*:*:*:*"
],
"product": "Tanium Appliance",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.8.3.0146",
"status": "affected",
"version": "1.8.3.0",
"versionType": "custom"
},
{
"lessThan": "1.8.4.0157",
"status": "affected",
"version": "1.8.4.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:12:53.375Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper output sanitization vulnerability in Tanium Appliance."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-116",
"description": "Improper Encoding or Escaping of Output",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:26:06.378Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-003",
"url": "https://security.tanium.com/TAN-2025-003"
}
],
"title": "Tanium addressed an improper output sanitization vulnerability in TanOS."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15312",
"datePublished": "2026-02-05T18:26:06.378Z",
"dateReserved": "2025-12-29T23:12:53.559Z",
"dateUpdated": "2026-02-05T18:26:06.378Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15324 (GCVE-0-2025-15324)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-05 18:25
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Engage.
Summary
Tanium addressed a documentation issue in Engage.
Severity ?
6.6 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_engage:1.3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_engage:1.6.192:*:*:*:*:*:*:*"
],
"product": "Engage",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.3.37",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
},
{
"lessThan": "1.6.193",
"status": "affected",
"version": "1.6.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:03.546Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed a documentation issue in Engage."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:25:52.474Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-004",
"url": "https://security.tanium.com/TAN-2025-004"
}
],
"title": "Tanium addressed a local privilege escalation vulnerability in Engage."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15324",
"datePublished": "2026-02-05T18:25:52.474Z",
"dateReserved": "2025-12-29T23:13:03.776Z",
"dateUpdated": "2026-02-05T18:25:52.474Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15325 (GCVE-0-2025-15325)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-05 18:25
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Discover.
Summary
Tanium addressed an improper input validation vulnerability in Discover.
Severity ?
6.3 (Medium)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_discover:4.10.89:*:*:*:*:*:*:*"
],
"product": "Discover",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.10.90",
"status": "affected",
"version": "4.10.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:04.660Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper input validation vulnerability in Discover."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:25:29.908Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-005",
"url": "https://security.tanium.com/TAN-2025-005"
}
],
"title": "Tanium addressed an improper input validation vulnerability in Discover."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15325",
"datePublished": "2026-02-05T18:25:29.908Z",
"dateReserved": "2025-12-29T23:13:04.840Z",
"dateUpdated": "2026-02-05T18:25:29.908Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15326 (GCVE-0-2025-15326)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-05 18:25
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Patch.
Summary
Tanium addressed an improper access controls vulnerability in Patch.
Severity ?
4.3 (Medium)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_patch:3.17.2261:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_patch:3.19.194:*:*:*:*:*:*:*"
],
"product": "Patch",
"vendor": "Tanium",
"versions": [
{
"lessThan": "3.17.2262",
"status": "affected",
"version": "3.17.0",
"versionType": "custom"
},
{
"lessThan": "3.19.195",
"status": "affected",
"version": "3.19.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:29.639Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Patch."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:25:11.487Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-006",
"url": "https://security.tanium.com/TAN-2025-006"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Patch."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15326",
"datePublished": "2026-02-05T18:25:11.487Z",
"dateReserved": "2025-12-29T23:13:29.803Z",
"dateUpdated": "2026-02-05T18:25:11.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15327 (GCVE-0-2025-15327)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-05 18:25
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Deploy.
Summary
Tanium addressed an improper access controls vulnerability in Deploy.
Severity ?
4.3 (Medium)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_deploy:2.26.1252:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_deploy:2.30.149:*:*:*:*:*:*:*"
],
"product": "Deploy",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.26.1253",
"status": "affected",
"version": "2.26.0",
"versionType": "custom"
},
{
"lessThan": "2.30.150",
"status": "affected",
"version": "2.30.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:29.851Z",
"datePublic": "2025-01-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Deploy."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:25:11.258Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-006",
"url": "https://security.tanium.com/TAN-2025-006"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Deploy."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15327",
"datePublished": "2026-02-05T18:25:11.258Z",
"dateReserved": "2025-12-29T23:13:30.151Z",
"dateUpdated": "2026-02-05T18:25:11.258Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15328 (GCVE-0-2025-15328)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:24 – Updated: 2026-02-05 18:24
VLAI?
Title
Tanium addressed an improper link resolution before file access vulnerability in Enforce.
Summary
Tanium addressed an improper link resolution before file access vulnerability in Enforce.
Severity ?
5 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_enforce:2.7.313:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_enforce:2.8.543:*:*:*:*:*:*:*"
],
"product": "Enforce",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.7.314",
"status": "affected",
"version": "2.7.0",
"versionType": "custom"
},
{
"lessThan": "2.8.544",
"status": "affected",
"version": "2.8.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:30.169Z",
"datePublic": "2025-02-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper link resolution before file access vulnerability in Enforce."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:24:42.534Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-007",
"url": "https://security.tanium.com/TAN-2025-007"
}
],
"title": "Tanium addressed an improper link resolution before file access vulnerability in Enforce."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15328",
"datePublished": "2026-02-05T18:24:42.534Z",
"dateReserved": "2025-12-29T23:13:30.399Z",
"dateUpdated": "2026-02-05T18:24:42.534Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15330 (GCVE-0-2025-15330)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:24 – Updated: 2026-02-05 18:24
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Deploy.
Summary
Tanium addressed an improper input validation vulnerability in Deploy.
Severity ?
8.8 (High)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_deploy:2.26.1278:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_deploy:2.30.174:*:*:*:*:*:*:*"
],
"product": "Deploy",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.26.1279",
"status": "affected",
"version": "2.26.0",
"versionType": "custom"
},
{
"lessThan": "2.30.175",
"status": "affected",
"version": "2.30.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:30.875Z",
"datePublic": "2025-03-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper input validation vulnerability in Deploy."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:24:27.066Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-012",
"url": "https://security.tanium.com/TAN-2025-012"
}
],
"title": "Tanium addressed an improper input validation vulnerability in Deploy."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15330",
"datePublished": "2026-02-05T18:24:27.066Z",
"dateReserved": "2025-12-29T23:13:31.023Z",
"dateUpdated": "2026-02-05T18:24:27.066Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15331 (GCVE-0-2025-15331)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:23 – Updated: 2026-02-05 18:23
VLAI?
Title
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
Summary
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
Severity ?
4.3 (Medium)
CWE
- CWE-459 - Incomplete Cleanup
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_connect:5.22.99:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_connect:5.26.86:*:*:*:*:*:*:*"
],
"product": "Connect",
"vendor": "Tanium",
"versions": [
{
"lessThan": "5.22.100",
"status": "affected",
"version": "5.22.0",
"versionType": "custom"
},
{
"lessThan": "5.26.87",
"status": "affected",
"version": "5.26.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:31.267Z",
"datePublic": "2025-04-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an uncontrolled resource consumption vulnerability in Connect."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-459",
"description": "Incomplete Cleanup",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:23:51.939Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-015",
"url": "https://security.tanium.com/TAN-2025-015"
}
],
"title": "Tanium addressed an uncontrolled resource consumption vulnerability in Connect."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15331",
"datePublished": "2026-02-05T18:23:51.939Z",
"dateReserved": "2025-12-29T23:13:31.408Z",
"dateUpdated": "2026-02-05T18:23:51.939Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15329 (GCVE-0-2025-15329)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:23 – Updated: 2026-02-05 18:23
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
Severity ?
4.9 (Medium)
CWE
- CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Threat Response |
Affected:
4.5.0 , < 4.5.250
(custom)
Affected: 4.6.0 , < 4.6.518 (custom) Affected: 4.9.0 , < 4.9.297 (custom) cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*"
],
"product": "Threat Response",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.5.250",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.518",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.9.297",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:30.479Z",
"datePublic": "2025-07-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-201",
"description": "Insertion of Sensitive Information Into Sent Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:23:27.646Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-019",
"url": "https://security.tanium.com/TAN-2025-019"
}
],
"title": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15329",
"datePublished": "2026-02-05T18:23:27.646Z",
"dateReserved": "2025-12-29T23:13:30.646Z",
"dateUpdated": "2026-02-05T18:23:27.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15332 (GCVE-0-2025-15332)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:22 – Updated: 2026-02-05 18:22
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
Severity ?
4.9 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Threat Response |
Affected:
4.5.0 , < 4.5.250
(custom)
Affected: 4.6.0 , < 4.6.518 (custom) Affected: 4.9.0 , < 4.9.297 (custom) cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*"
],
"product": "Threat Response",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.5.250",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.518",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.9.297",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:31.819Z",
"datePublic": "2025-07-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:22:45.788Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-020",
"url": "https://security.tanium.com/TAN-2025-020"
}
],
"title": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15332",
"datePublished": "2026-02-05T18:22:45.788Z",
"dateReserved": "2025-12-29T23:13:31.979Z",
"dateUpdated": "2026-02-05T18:22:45.788Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15321 (GCVE-0-2025-15321)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:20 – Updated: 2026-02-05 18:20
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
Summary
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
Severity ?
CWE
- CWE-426 - Untrusted Search Path
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Tanium Appliance |
Affected:
1.8.3.0 , < 1.8.3.0196
(custom)
Affected: 1.8.5.0 , < 1.8.5.0199 (custom) Affected: 1.8.5.0 , < 1.8.5.0227 (custom) cpe:2.3:a:tanium:tanos:1.8.3.0195:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.5.0198:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.5.0226:*:*:*:*:*:*:* |
Credits
Filip Waeytens
Frank Lycops
Jean-Michel Huguet
Jorge Escabias
Justin Hocquel from NCIA/NCSC
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:tanos:1.8.3.0195:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.5.0198:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.5.0226:*:*:*:*:*:*:*"
],
"product": "Tanium Appliance",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.8.3.0196",
"status": "affected",
"version": "1.8.3.0",
"versionType": "custom"
},
{
"lessThan": "1.8.5.0199",
"status": "affected",
"version": "1.8.5.0",
"versionType": "custom"
},
{
"lessThan": "1.8.5.0227",
"status": "affected",
"version": "1.8.5.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Filip Waeytens"
},
{
"lang": "en",
"type": "reporter",
"value": "Frank Lycops"
},
{
"lang": "en",
"type": "reporter",
"value": "Jean-Michel Huguet"
},
{
"lang": "en",
"type": "reporter",
"value": "Jorge Escabias"
},
{
"lang": "en",
"type": "reporter",
"value": "Justin Hocquel from NCIA/NCSC"
}
],
"dateAssigned": "2025-12-29T23:13:00.595Z",
"datePublic": "2025-08-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper input validation vulnerability in Tanium Appliance."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-426",
"description": "Untrusted Search Path",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:20:39.404Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-024",
"url": "https://security.tanium.com/TAN-2025-024"
}
],
"title": "Tanium addressed an improper input validation vulnerability in Tanium Appliance."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15321",
"datePublished": "2026-02-05T18:20:39.404Z",
"dateReserved": "2025-12-29T23:13:00.749Z",
"dateUpdated": "2026-02-05T18:20:39.404Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15333 (GCVE-0-2025-15333)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:20 – Updated: 2026-02-05 18:20
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
Severity ?
4.3 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Threat Response |
Affected:
4.5.0 , < 4.5.266
(custom)
Affected: 4.6.0 , < 4.6.536 (custom) Affected: 4.9.0 , < 4.9.324 (custom) cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:* |
Credits
Filip Waeytens
Frank Lycops
Jean-Michel Huguet
Jorge Escabias
Justin Hocquel from NCIA/NCSC
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
],
"product": "Threat Response",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.5.266",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.536",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.9.324",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Filip Waeytens"
},
{
"lang": "en",
"type": "reporter",
"value": "Frank Lycops"
},
{
"lang": "en",
"type": "reporter",
"value": "Jean-Michel Huguet"
},
{
"lang": "en",
"type": "reporter",
"value": "Jorge Escabias"
},
{
"lang": "en",
"type": "reporter",
"value": "Justin Hocquel from NCIA/NCSC"
}
],
"dateAssigned": "2025-12-29T23:13:32.264Z",
"datePublic": "2025-08-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:20:14.854Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-025",
"url": "https://security.tanium.com/TAN-2025-025"
}
],
"title": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15333",
"datePublished": "2026-02-05T18:20:14.854Z",
"dateReserved": "2025-12-29T23:13:32.432Z",
"dateUpdated": "2026-02-05T18:20:14.854Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15334 (GCVE-0-2025-15334)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:18 – Updated: 2026-02-05 18:18
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
Severity ?
4.3 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Threat Response |
Affected:
4.5.0 , < 4.5.266
(custom)
Affected: 4.6.0 , < 4.6.536 (custom) Affected: 4.9.0 , < 4.9.324 (custom) cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:* |
Credits
Filip Waeytens
Frank Lycops
Jean-Michel Huguet
Jorge Escabias
Justin Hocquel from NCIA/NCSC
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
],
"product": "Threat Response",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.5.266",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.536",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.9.324",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Filip Waeytens"
},
{
"lang": "en",
"type": "reporter",
"value": "Frank Lycops"
},
{
"lang": "en",
"type": "reporter",
"value": "Jean-Michel Huguet"
},
{
"lang": "en",
"type": "reporter",
"value": "Jorge Escabias"
},
{
"lang": "en",
"type": "reporter",
"value": "Justin Hocquel from NCIA/NCSC"
}
],
"dateAssigned": "2025-12-29T23:13:32.895Z",
"datePublic": "2025-08-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:18:04.149Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-026",
"url": "https://security.tanium.com/TAN-2025-026"
}
],
"title": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15334",
"datePublished": "2026-02-05T18:18:04.149Z",
"dateReserved": "2025-12-29T23:13:33.075Z",
"dateUpdated": "2026-02-05T18:18:04.149Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15335 (GCVE-0-2025-15335)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:17 – Updated: 2026-02-05 18:17
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
Severity ?
4.3 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Threat Response |
Affected:
4.5.0 , < 4.5.266
(custom)
Affected: 4.6.0 , < 4.6.536 (custom) Affected: 4.9.0 , < 4.9.324 (custom) cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:* |
Credits
Filip Waeytens
Frank Lycops
Jean-Michel Huguet
Jorge Escabias
Justin Hocquel at NCIA/NCSC
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
],
"product": "Threat Response",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.5.266",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.536",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.9.324",
"status": "affected",
"version": "4.9.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Filip Waeytens"
},
{
"lang": "en",
"type": "reporter",
"value": "Frank Lycops"
},
{
"lang": "en",
"type": "reporter",
"value": "Jean-Michel Huguet"
},
{
"lang": "en",
"type": "reporter",
"value": "Jorge Escabias"
},
{
"lang": "en",
"type": "reporter",
"value": "Justin Hocquel at NCIA/NCSC"
}
],
"dateAssigned": "2025-12-29T23:13:47.658Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:17:28.244Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-027",
"url": "https://security.tanium.com/TAN-2025-027"
}
],
"title": "Tanium addressed an information disclosure vulnerability in Threat Response."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15335",
"datePublished": "2026-02-05T18:17:28.244Z",
"dateReserved": "2025-12-29T23:13:47.826Z",
"dateUpdated": "2026-02-05T18:17:28.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15341 (GCVE-0-2025-15341)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
Summary
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Benchmark |
Affected:
2.7.0 , < 2.7.98
(custom)
Affected: 2.9.0 , < 2.9.188 (custom) Affected: 2.12.0 , < 2.12.82 (custom) cpe:2.3:a:tanium:service_benchmark:2.7.97:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_benchmark:2.9.187:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_benchmark:2.12.81:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_benchmark:2.7.97:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_benchmark:2.9.187:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_benchmark:2.12.81:*:*:*:*:*:*:*"
],
"product": "Benchmark",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.7.98",
"status": "affected",
"version": "2.7.0",
"versionType": "custom"
},
{
"lessThan": "2.9.188",
"status": "affected",
"version": "2.9.0",
"versionType": "custom"
},
{
"lessThan": "2.12.82",
"status": "affected",
"version": "2.12.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:49.756Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Benchmark."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:29.666Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Benchmark."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15341",
"datePublished": "2026-02-05T18:16:29.666Z",
"dateReserved": "2025-12-29T23:13:49.910Z",
"dateUpdated": "2026-02-05T18:16:29.666Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15340 (GCVE-0-2025-15340)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Comply.
Summary
Tanium addressed an incorrect default permissions vulnerability in Comply.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Comply |
Affected:
2.24.0 , < 2.24.159
(custom)
Affected: 2.29.0 , < 2.29.124 (custom) Affected: 2.32.0 , < 2.32.155 (custom) cpe:2.3:a:tanium:service_comply:2.24.158:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_comply:2.29.123:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_comply:2.32.154:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_comply:2.24.158:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_comply:2.29.123:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_comply:2.32.154:*:*:*:*:*:*:*"
],
"product": "Comply",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.24.159",
"status": "affected",
"version": "2.24.0",
"versionType": "custom"
},
{
"lessThan": "2.29.124",
"status": "affected",
"version": "2.29.0",
"versionType": "custom"
},
{
"lessThan": "2.32.155",
"status": "affected",
"version": "2.32.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:49.256Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Comply."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:29.226Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Comply."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15340",
"datePublished": "2026-02-05T18:16:29.226Z",
"dateReserved": "2025-12-29T23:13:49.402Z",
"dateUpdated": "2026-02-05T18:16:29.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15339 (GCVE-0-2025-15339)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Discover.
Summary
Tanium addressed an incorrect default permissions vulnerability in Discover.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_discover:4.10.117:*:*:*:*:*:*:*"
],
"product": "Discover",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.10.118",
"status": "affected",
"version": "4.10.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:48.931Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Discover."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:29.455Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Discover."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15339",
"datePublished": "2026-02-05T18:16:29.455Z",
"dateReserved": "2025-12-29T23:13:49.089Z",
"dateUpdated": "2026-02-05T18:16:29.455Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15337 (GCVE-0-2025-15337)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Patch.
Summary
Tanium addressed an incorrect default permissions vulnerability in Patch.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Patch |
Affected:
3.17.0 , < 3.17.2300
(custom)
Affected: 3.19.0 , < 3.19.232 (custom) Affected: 3.24.0 , < 3.24.137 (custom) cpe:2.3:a:tanium:service_patch:3.17.2299:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_patch:3.19.231:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_patch:3.24.136:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_patch:3.17.2299:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_patch:3.19.231:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_patch:3.24.136:*:*:*:*:*:*:*"
],
"product": "Patch",
"vendor": "Tanium",
"versions": [
{
"lessThan": "3.17.2300",
"status": "affected",
"version": "3.17.0",
"versionType": "custom"
},
{
"lessThan": "3.19.232",
"status": "affected",
"version": "3.19.0",
"versionType": "custom"
},
{
"lessThan": "3.24.137",
"status": "affected",
"version": "3.24.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:48.304Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Patch."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:28.498Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Patch."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15337",
"datePublished": "2026-02-05T18:16:28.498Z",
"dateReserved": "2025-12-29T23:13:48.471Z",
"dateUpdated": "2026-02-05T18:16:28.498Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15336 (GCVE-0-2025-15336)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Performance.
Summary
Tanium addressed an incorrect default permissions vulnerability in Performance.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Performance |
Affected:
1.17.0 , < 1.17.134
(custom)
Affected: 1.21.0 , < 1.21.141 (custom) Affected: 1.22.0 , < 1.22.288 (custom) cpe:2.3:a:tanium:service_performance:1.17.133:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_performance:1.21.140:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_performance:1.22.287:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_performance:1.17.133:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_performance:1.21.140:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_performance:1.22.287:*:*:*:*:*:*:*"
],
"product": "Performance",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.17.134",
"status": "affected",
"version": "1.17.0",
"versionType": "custom"
},
{
"lessThan": "1.21.141",
"status": "affected",
"version": "1.21.0",
"versionType": "custom"
},
{
"lessThan": "1.22.288",
"status": "affected",
"version": "1.22.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:47.970Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Performance."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:28.770Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Performance."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15336",
"datePublished": "2026-02-05T18:16:28.770Z",
"dateReserved": "2025-12-29T23:13:48.142Z",
"dateUpdated": "2026-02-05T18:16:28.770Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15338 (GCVE-0-2025-15338)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-05 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Partner Integration.
Summary
Tanium addressed an incorrect default permissions vulnerability in Partner Integration.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Partner Integration |
Affected:
1.0.0 , < 1.0.224
(custom)
Affected: 1.2.0 , < 1.2.33 (custom) Affected: 1.3.0 , < 1.3.40 (custom) cpe:2.3:a:tanium:service_partnerintegration:1.0.223:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_partnerintegration:1.2.32:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_partnerintegration:1.3.39:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_partnerintegration:1.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_partnerintegration:1.2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_partnerintegration:1.3.39:*:*:*:*:*:*:*"
],
"product": "Partner Integration",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.0.224",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThan": "1.2.33",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
},
{
"lessThan": "1.3.40",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:48.583Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Partner Integration."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:16:28.993Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-029",
"url": "https://security.tanium.com/TAN-2025-029"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Partner Integration."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15338",
"datePublished": "2026-02-05T18:16:28.993Z",
"dateReserved": "2025-12-29T23:13:48.747Z",
"dateUpdated": "2026-02-05T18:16:28.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15342 (GCVE-0-2025-15342)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:13 – Updated: 2026-02-05 18:13
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Reputation.
Summary
Tanium addressed an improper access controls vulnerability in Reputation.
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Reputation |
Affected:
6.3.0 , < 6.3.227
(custom)
Affected: 6.5.0 , < 6.5.50 (custom) Affected: 6.6.0 , < 6.6.72 (custom) cpe:2.3:a:tanium:service_reputation:6.3.226:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_reputation:6.5.49:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_reputation:6.6.71:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_reputation:6.3.226:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_reputation:6.5.49:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_reputation:6.6.71:*:*:*:*:*:*:*"
],
"product": "Reputation",
"vendor": "Tanium",
"versions": [
{
"lessThan": "6.3.227",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
},
{
"lessThan": "6.5.50",
"status": "affected",
"version": "6.5.0",
"versionType": "custom"
},
{
"lessThan": "6.6.72",
"status": "affected",
"version": "6.6.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:50.220Z",
"datePublic": "2025-09-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Reputation."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:13:01.081Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-030",
"url": "https://security.tanium.com/TAN-2025-030"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Reputation."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15342",
"datePublished": "2026-02-05T18:13:01.081Z",
"dateReserved": "2025-12-29T23:13:50.391Z",
"dateUpdated": "2026-02-05T18:13:01.081Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15323 (GCVE-0-2025-15323)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:12 – Updated: 2026-02-05 18:12
VLAI?
Title
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.
Summary
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.
Severity ?
CWE
- CWE-295 - Improper Certificate Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Tanium Appliance |
Affected:
1.8.3.0 , < 1.8.3.0199
(custom)
Affected: 1.8.4.0 , < 1.8.4.0205 (custom) Affected: 1.8.5.0 , < 1.8.5.0236 (custom) cpe:2.3:a:tanium:tanos:1.8.3.0198:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.4.0204:*:*:*:*:*:*:* cpe:2.3:a:tanium:tanos:1.8.5.0235:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:tanos:1.8.3.0198:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.4.0204:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:tanos:1.8.5.0235:*:*:*:*:*:*:*"
],
"product": "Tanium Appliance",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.8.3.0199",
"status": "affected",
"version": "1.8.3.0",
"versionType": "custom"
},
{
"lessThan": "1.8.4.0205",
"status": "affected",
"version": "1.8.4.0",
"versionType": "custom"
},
{
"lessThan": "1.8.5.0236",
"status": "affected",
"version": "1.8.5.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:02.561Z",
"datePublic": "2025-10-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper certificate validation vulnerability in Tanium Appliance."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:12:21.517Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-031",
"url": "https://security.tanium.com/TAN-2025-031"
}
],
"title": "Tanium addressed an improper certificate validation vulnerability in Tanium Appliance."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15323",
"datePublished": "2026-02-05T18:12:21.517Z",
"dateReserved": "2025-12-29T23:13:02.858Z",
"dateUpdated": "2026-02-05T18:12:21.517Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15343 (GCVE-0-2025-15343)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:11 – Updated: 2026-02-05 18:11
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Enforce.
Summary
Tanium addressed an incorrect default permissions vulnerability in Enforce.
Severity ?
6.5 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Enforce |
Affected:
2.7.0 , < 2.7.367
(custom)
Affected: 2.8.0 , < 2.8.601 (custom) Affected: 2.9.0 , < 2.9.574 (custom) cpe:2.3:a:tanium:service_enforce:2.7.366:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_enforce:2.8.600:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_enforce:2.9.573:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_enforce:2.7.366:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_enforce:2.8.600:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_enforce:2.9.573:*:*:*:*:*:*:*"
],
"product": "Enforce",
"vendor": "Tanium",
"versions": [
{
"lessThan": "2.7.367",
"status": "affected",
"version": "2.7.0",
"versionType": "custom"
},
{
"lessThan": "2.8.601",
"status": "affected",
"version": "2.8.0",
"versionType": "custom"
},
{
"lessThan": "2.9.574",
"status": "affected",
"version": "2.9.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:50.827Z",
"datePublic": "2025-10-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an incorrect default permissions vulnerability in Enforce."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:11:30.318Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-032",
"url": "https://security.tanium.com/TAN-2025-032"
}
],
"title": "Tanium addressed an incorrect default permissions vulnerability in Enforce."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15343",
"datePublished": "2026-02-05T18:11:30.318Z",
"dateReserved": "2025-12-29T23:13:50.981Z",
"dateUpdated": "2026-02-05T18:11:30.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15289 (GCVE-0-2025-15289)
Vulnerability from cvelistv5 – Published: 2026-02-05 18:10 – Updated: 2026-02-05 18:10
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Interact.
Summary
Tanium addressed an improper access controls vulnerability in Interact.
Severity ?
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Interact |
Affected:
3.1.0 , < 3.1.337
(custom)
Affected: 3.2.0 , < 3.2.185 (custom) Affected: 3.5.0 , < 3.5.90 (custom) cpe:2.3:a:tanium:service_interact:3.1.336:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_interact:3.2.184:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_interact:3.5.89:*:*:*:*:*:*:* |
{
"containers": {
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_interact:3.1.336:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_interact:3.2.184:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_interact:3.5.89:*:*:*:*:*:*:*"
],
"product": "Interact",
"vendor": "Tanium",
"versions": [
{
"lessThan": "3.1.337",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
},
{
"lessThan": "3.2.185",
"status": "affected",
"version": "3.2.0",
"versionType": "custom"
},
{
"lessThan": "3.5.90",
"status": "affected",
"version": "3.5.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:02:29.166Z",
"datePublic": "2025-10-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Interact."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T18:10:28.261Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-033",
"url": "https://security.tanium.com/TAN-2025-033"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Interact."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15289",
"datePublished": "2026-02-05T18:10:28.261Z",
"dateReserved": "2025-12-29T23:02:29.360Z",
"dateUpdated": "2026-02-05T18:10:28.261Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15322 (GCVE-0-2025-15322)
Vulnerability from cvelistv5 – Published: 2026-01-30 00:20 – Updated: 2026-02-05 16:00
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Tanium Server.
Summary
Tanium addressed an improper access controls vulnerability in Tanium Server.
Severity ?
4.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Tanium Server |
Affected:
7.6.2.0 , < 7.6.2.1327
(custom)
Affected: 7.6.4.0 , < 7.6.4.2160 (custom) Affected: 7.7.3.0 , < 7.7.3.8231 (custom) cpe:2.3:a:tanium:server:7.6.2.1326:*:*:*:*:*:*:* cpe:2.3:a:tanium:server:7.6.4.2159:*:*:*:*:*:*:* cpe:2.3:a:tanium:server:7.7.3.8230:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-15322",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-30T18:24:51.459482Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-30T18:25:12.901Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:server:7.6.2.1326:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:server:7.6.4.2159:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:server:7.7.3.8230:*:*:*:*:*:*:*"
],
"product": "Tanium Server",
"vendor": "Tanium",
"versions": [
{
"lessThan": "7.6.2.1327",
"status": "affected",
"version": "7.6.2.0",
"versionType": "custom"
},
{
"lessThan": "7.6.4.2160",
"status": "affected",
"version": "7.6.4.0",
"versionType": "custom"
},
{
"lessThan": "7.7.3.8231",
"status": "affected",
"version": "7.7.3.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:01.592Z",
"datePublic": "2025-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Tanium Server."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T16:00:17.135Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-028",
"url": "https://security.tanium.com/TAN-2025-028"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Tanium Server."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15322",
"datePublished": "2026-01-30T00:20:57.307Z",
"dateReserved": "2025-12-29T23:13:02.373Z",
"dateUpdated": "2026-02-05T16:00:17.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15288 (GCVE-0-2025-15288)
Vulnerability from cvelistv5 – Published: 2026-01-29 20:10 – Updated: 2026-02-05 15:57
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Interact.
Summary
Tanium addressed an improper access controls vulnerability in Interact.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-15288",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-29T20:31:10.582156Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-29T20:31:17.700Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_interact:3.5.89:*:*:*:*:*:*:*"
],
"product": "Interact",
"vendor": "Tanium",
"versions": [
{
"lessThan": "3.5.90",
"status": "affected",
"version": "3.5.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:02:11.893Z",
"datePublic": "2025-10-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper access controls vulnerability in Interact."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T15:57:07.320Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-034",
"url": "https://security.tanium.com/TAN-2025-034"
}
],
"title": "Tanium addressed an improper access controls vulnerability in Interact."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15288",
"datePublished": "2026-01-29T20:10:48.480Z",
"dateReserved": "2025-12-29T23:02:12.448Z",
"dateUpdated": "2026-02-05T15:57:07.320Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-15344 (GCVE-0-2025-15344)
Vulnerability from cvelistv5 – Published: 2026-01-28 23:46 – Updated: 2026-02-05 16:01
VLAI?
Title
Tanium addressed a SQL injection vulnerability in Asset.
Summary
Tanium addressed a SQL injection vulnerability in Asset.
Severity ?
6.3 (Medium)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Tanium | Asset |
Affected:
1.28.0 , < 1.28.254
(custom)
Affected: 1.32.0 , < 1.32.161 (custom) Affected: 1.33.0 , < 1.33.250 (custom) cpe:2.3:a:tanium:service_asset:1.28.253:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_asset:1.32.160:*:*:*:*:*:*:* cpe:2.3:a:tanium:service_asset:1.33.249:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-15344",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-29T20:00:43.114517Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-29T20:01:17.896Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_asset:1.28.253:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_asset:1.32.160:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_asset:1.33.249:*:*:*:*:*:*:*"
],
"product": "Asset",
"vendor": "Tanium",
"versions": [
{
"lessThan": "1.28.254",
"status": "affected",
"version": "1.28.0",
"versionType": "custom"
},
{
"lessThan": "1.32.161",
"status": "affected",
"version": "1.32.0",
"versionType": "custom"
},
{
"lessThan": "1.33.250",
"status": "affected",
"version": "1.33.0",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2025-12-29T23:13:51.498Z",
"datePublic": "2025-10-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed a SQL injection vulnerability in Asset."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T16:01:05.057Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2025-035",
"url": "https://security.tanium.com/TAN-2025-035"
}
],
"title": "Tanium addressed a SQL injection vulnerability in Asset."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2025-15344",
"datePublished": "2026-01-28T23:46:49.415Z",
"dateReserved": "2025-12-29T23:13:51.655Z",
"dateUpdated": "2026-02-05T16:01:05.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-0925 (GCVE-0-2026-0925)
Vulnerability from cvelistv5 – Published: 2026-01-26 17:51 – Updated: 2026-02-02 20:01
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Discover.
Summary
Tanium addressed an improper input validation vulnerability in Discover.
Severity ?
CWE
- CWE-1284 - Improper Validation of Specified Quantity in Input
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0925",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-26T19:50:33.379257Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-26T19:50:46.864Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_asset:4.10.133:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_asset:4.15.129:*:*:*:*:*:*:*"
],
"product": "Discover",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.10.134",
"status": "affected",
"version": "4.10",
"versionType": "custom"
},
{
"lessThan": "4.15.130",
"status": "affected",
"version": "4.15",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2026-01-13T20:48:10.331Z",
"datePublic": "2026-01-24T01:37:51.794Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an improper input validation vulnerability in Discover."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1284",
"description": "Improper Validation of Specified Quantity in Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-02T20:01:37.786Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2026-002",
"url": "https://security.tanium.com/TAN-2026-002"
}
],
"title": "Tanium addressed an improper input validation vulnerability in Discover."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2026-0925",
"datePublished": "2026-01-26T17:51:34.091Z",
"dateReserved": "2026-01-13T20:48:10.968Z",
"dateUpdated": "2026-02-02T20:01:37.786Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1224 (GCVE-0-2026-1224)
Vulnerability from cvelistv5 – Published: 2026-01-26 17:36 – Updated: 2026-02-02 20:01
VLAI?
Title
Tanium addressed an uncontrolled resource consumption vulnerability in Discover.
Summary
Tanium addressed an uncontrolled resource consumption vulnerability in Discover.
Severity ?
4.9 (Medium)
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1224",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-26T21:04:57.237600Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-26T21:05:07.722Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:tanium:service_asset:4.10.133:*:*:*:*:*:*:*",
"cpe:2.3:a:tanium:service_asset:4.15.129:*:*:*:*:*:*:*"
],
"product": "Discover",
"vendor": "Tanium",
"versions": [
{
"lessThan": "4.10.134",
"status": "affected",
"version": "4.10",
"versionType": "custom"
},
{
"lessThan": "4.15.130",
"status": "affected",
"version": "4.15",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2026-01-20T06:50:46.661Z",
"datePublic": "2026-01-24T01:37:37.554Z",
"descriptions": [
{
"lang": "en",
"value": "Tanium addressed an uncontrolled resource consumption vulnerability in Discover."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-02T20:01:38.031Z",
"orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"shortName": "Tanium"
},
"references": [
{
"name": "TAN-2026-001",
"url": "https://security.tanium.com/TAN-2026-001"
}
],
"title": "Tanium addressed an uncontrolled resource consumption vulnerability in Discover."
}
},
"cveMetadata": {
"assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
"assignerShortName": "Tanium",
"cveId": "CVE-2026-1224",
"datePublished": "2026-01-26T17:36:33.504Z",
"dateReserved": "2026-01-20T06:50:47.201Z",
"dateUpdated": "2026-02-02T20:01:38.031Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}