CVE-2025-15334

4.3 MEDIUM

📋 TL;DR

An information disclosure vulnerability in Tanium Threat Response could allow authenticated attackers to access sensitive data they shouldn't have permission to view. This affects organizations using vulnerable versions of Tanium Threat Response. The vulnerability stems from incorrect default permissions (CWE-276).

💻 Affected Systems

Products:
  • Tanium Threat Response
Versions: Specific versions not detailed in advisory; consult Tanium advisory for exact affected versions
Operating Systems: All platforms running Tanium Threat Response
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability involves incorrect default permissions that could allow information disclosure to authenticated users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive investigation data, threat intelligence, or system information that could be used for further attacks or intelligence gathering.

🟠

Likely Case

Privileged users or compromised accounts could view investigation details, endpoint data, or threat information beyond their intended access level.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minimal data exposure that can be quickly detected and contained.

🌐 Internet-Facing: LOW - Tanium deployments are typically internal enterprise systems not directly exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to gain unauthorized access to sensitive threat response data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Tanium system. The vulnerability is in permission handling logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tanium advisory TAN-2025-026 for specific patched versions

Vendor Advisory: https://security.tanium.com/TAN-2025-026

Restart Required: Yes

Instructions:

1. Review Tanium advisory TAN-2025-026. 2. Identify affected Tanium Threat Response versions. 3. Apply the recommended patch/update. 4. Restart Tanium services as required. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict Access Controls

all

Tighten user permissions and implement principle of least privilege for Tanium Threat Response access

Enhanced Monitoring

all

Increase logging and monitoring of access to sensitive threat response data

🧯 If You Can't Patch

  • Implement strict access controls and review all user permissions in Tanium Threat Response
  • Enable detailed audit logging for all access to threat response data and monitor for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check Tanium Threat Response version against affected versions listed in advisory TAN-2025-026

Check Version:

Check Tanium console or use Tanium CLI commands specific to your deployment

Verify Fix Applied:

Verify Tanium Threat Response has been updated to patched version and test permission controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to threat response data
  • Multiple failed permission checks followed by successful access

Network Indicators:

  • Unusual data transfer volumes from Tanium Threat Response components

SIEM Query:

source="tanium" AND (event_type="access_denied" OR event_type="permission_violation") AND resource="threat_response"

🔗 References

📤 Share & Export