CVE-2025-15335

4.3 MEDIUM

📋 TL;DR

An information disclosure vulnerability in Tanium Threat Response could allow authenticated attackers to access sensitive data they shouldn't have permission to view. This affects organizations using Tanium Threat Response with vulnerable configurations. The vulnerability stems from incorrect default permissions (CWE-276).

💻 Affected Systems

Products:
  • Tanium Threat Response
Versions: Versions prior to 7.7.4
Operating Systems: All supported Tanium platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to Tanium Threat Response module.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive threat intelligence data, investigation details, or system information that could be used for further attacks.

🟠

Likely Case

Privileged users or compromised accounts could view restricted threat response data, potentially exposing internal security operations.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to authorized users viewing data they shouldn't access.

🌐 Internet-Facing: LOW - Tanium deployments are typically internal enterprise tools, not directly internet-facing.
🏢 Internal Only: MEDIUM - Requires authenticated access but could expose sensitive security operations data to internal threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Tanium Threat Response with some existing permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.7.4 and later

Vendor Advisory: https://security.tanium.com/TAN-2025-027

Restart Required: Yes

Instructions:

1. Download Tanium Threat Response 7.7.4 or later from Tanium support portal. 2. Follow Tanium's standard upgrade procedures for Threat Response module. 3. Restart Tanium services as required by the upgrade process.

🔧 Temporary Workarounds

Restrict Access to Threat Response

all

Limit user access to Tanium Threat Response module to only necessary personnel

Review and Audit Permissions

all

Regularly review Tanium user permissions and audit access to Threat Response data

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege for Tanium Threat Response users
  • Monitor and audit access to Threat Response data for unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check Tanium Threat Response version in Tanium Console under Modules > Threat Response > About

Check Version:

In Tanium Console: Navigate to Modules > Threat Response > About

Verify Fix Applied:

Verify version is 7.7.4 or later in Tanium Console and test that only authorized users can access sensitive Threat Response data

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Threat Response data
  • Multiple failed permission checks followed by successful access

Network Indicators:

  • Unusual API calls to Threat Response endpoints from non-standard users

SIEM Query:

source="tanium" AND (event_type="permission_denied" OR event_type="data_access") AND module="threat_response"

🔗 References

📤 Share & Export