CVE-2025-15339

6.5 MEDIUM

📋 TL;DR

CVE-2025-15339 is an incorrect default permissions vulnerability in Tanium Discover that allows unauthorized users to access sensitive information. This affects organizations using Tanium Discover with default configurations, potentially exposing internal network data and asset information.

💻 Affected Systems

Products:
  • Tanium Discover
Versions: Specific versions not detailed in advisory; check Tanium advisory for exact affected versions
Operating Systems: All supported Tanium platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default permissions configuration of Tanium Discover module.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive network discovery data, enabling reconnaissance for further attacks or data exfiltration.

🟠

Likely Case

Internal users with limited permissions can access discovery data beyond their authorization level, violating least privilege principles.

🟢

If Mitigated

Proper access controls and network segmentation limit exposure, reducing impact to isolated data sets.

🌐 Internet-Facing: LOW - Tanium Discover is typically deployed internally and not directly internet-facing.
🏢 Internal Only: HIGH - Default permissions allow unauthorized internal access to sensitive discovery data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to Tanium environment but leverages default misconfigurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tanium advisory TAN-2025-029 for specific patched versions

Vendor Advisory: https://security.tanium.com/TAN-2025-029

Restart Required: Yes

Instructions:

1. Review Tanium advisory TAN-2025-029. 2. Update Tanium Discover to patched version. 3. Restart Tanium services. 4. Verify permissions are correctly configured.

🔧 Temporary Workarounds

Manual Permission Review

all

Review and tighten Discover module permissions manually

Review Tanium Console > Discover module permissions

🧯 If You Can't Patch

  • Implement strict network segmentation around Tanium servers
  • Enable detailed audit logging for all Discover module access

🔍 How to Verify

Check if Vulnerable:

Check Tanium version and compare against advisory TAN-2025-029

Check Version:

Check Tanium Console > About or use Tanium CLI commands

Verify Fix Applied:

Verify Tanium Discover version is updated and test permissions with limited user accounts

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Discover data
  • Permission changes in Tanium logs

Network Indicators:

  • Unusual data queries from non-admin accounts

SIEM Query:

source="tanium" AND (event_type="permission_violation" OR module="discover")

🔗 References

📤 Share & Export