CVE-2025-15333

4.3 MEDIUM

📋 TL;DR

CVE-2025-15333 is an information disclosure vulnerability in Tanium Threat Response that allows unauthorized access to sensitive data. Organizations using affected Tanium Threat Response versions are impacted. The vulnerability stems from improper default permissions (CWE-276).

💻 Affected Systems

Products:
  • Tanium Threat Response
Versions: Specific versions not detailed in reference; consult Tanium advisory TAN-2025-025
Operating Systems: All supported Tanium server OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of Tanium Threat Response; exact version ranges should be verified via vendor advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive threat intelligence data, configuration details, or system information stored in Threat Response, potentially enabling further attacks.

🟠

Likely Case

Unauthorized users within the network could view sensitive information they shouldn't have access to, violating data confidentiality.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users who already have some level of access.

🌐 Internet-Facing: LOW - Tanium deployments are typically internal enterprise management systems not directly exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to access sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation likely requires some level of access to the Tanium environment; CVSS 4.3 suggests moderate attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Tanium advisory TAN-2025-025 for specific patched versions

Vendor Advisory: https://security.tanium.com/TAN-2025-025

Restart Required: Yes

Instructions:

1. Review Tanium advisory TAN-2025-025. 2. Update Tanium Threat Response to patched version. 3. Restart Tanium services. 4. Verify fix implementation.

🔧 Temporary Workarounds

Restrict Access Controls

all

Tighten permissions and access controls to limit who can interact with Threat Response components

Network Segmentation

all

Isolate Tanium management network from general user networks to reduce attack surface

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege for Tanium users
  • Monitor Tanium Threat Response logs for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Tanium Threat Response version against affected versions listed in TAN-2025-025 advisory

Check Version:

tanium command-line or Tanium console to check Threat Response module version

Verify Fix Applied:

Verify Tanium Threat Response is updated to patched version and test access controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Threat Response data
  • Unusual query patterns in Tanium logs

Network Indicators:

  • Unexpected connections to Tanium Threat Response endpoints

SIEM Query:

source="tanium" AND (event_type="access_denied" OR resource="threat_response")

🔗 References

📤 Share & Export