Search criteria

40 vulnerabilities

CVE-2025-15313 (GCVE-0-2025-15313)

Vulnerability from cvelistv5 – Published: 2026-02-09 23:05 – Updated: 2026-02-10 20:17
VLAI?
Title
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
Summary
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium Tanium EUSS Affected: 1.17.0 , < 1.17.41 (custom)
Affected: 1.18.0 , < 1.18.28 (custom)
    cpe:2.3:a:tanium:endpoint_euss:1.17.40:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_euss:1.18.27:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15313",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T20:17:52.390755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T20:17:58.821Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:endpoint_euss:1.17.40:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_euss:1.18.27:*:*:*:*:*:*:*"
          ],
          "product": "Tanium EUSS",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.17.41",
              "status": "affected",
              "version": "1.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.18.28",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:53.970Z",
      "datePublic": "2025-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T23:09:09.849Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-010",
          "url": "https://security.tanium.com/TAN-2025-010"
        }
      ],
      "title": "Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15313",
    "datePublished": "2026-02-09T23:05:16.158Z",
    "dateReserved": "2025-12-29T23:12:54.257Z",
    "dateUpdated": "2026-02-10T20:17:58.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15314 (GCVE-0-2025-15314)

Vulnerability from cvelistv5 – Published: 2026-02-09 23:05 – Updated: 2026-02-10 20:18
VLAI?
Title
Tanium addressed an arbitrary file deletion vulnerability in end-user-cx.
Summary
Tanium addressed an arbitrary file deletion vulnerability in end-user-cx.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium end-user-cx Affected: 1.4.0 , < 1.4.1175 (custom)
Affected: 1.6.0 , < 1.6.926 (custom)
Affected: 1.8.0 , < 1.8.21 (custom)
    cpe:2.3:a:tanium:endpoint_end-user-cx:1.4.1174:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_end-user-cx:1.6.925:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_end-user-cx:1.8.20:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15314",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T20:18:17.474330Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T20:18:24.846Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:endpoint_end-user-cx:1.4.1174:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_end-user-cx:1.6.925:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_end-user-cx:1.8.20:*:*:*:*:*:*:*"
          ],
          "product": "end-user-cx",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.4.1175",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.6.926",
              "status": "affected",
              "version": "1.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.21",
              "status": "affected",
              "version": "1.8.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:54.705Z",
      "datePublic": "2025-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an arbitrary file deletion vulnerability in end-user-cx."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T23:06:46.478Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-010",
          "url": "https://security.tanium.com/TAN-2025-010"
        }
      ],
      "title": "Tanium addressed an arbitrary file deletion vulnerability in end-user-cx."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15314",
    "datePublished": "2026-02-09T23:05:16.503Z",
    "dateReserved": "2025-12-29T23:12:54.874Z",
    "dateUpdated": "2026-02-10T20:18:24.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15310 (GCVE-0-2025-15310)

Vulnerability from cvelistv5 – Published: 2026-02-09 23:00 – Updated: 2026-02-10 20:17
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
Summary
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium Patch Endpoint Tools Affected: 3.17.0 , < 3.17.10195 (custom)
Affected: 10.1.0 , < 10.1.33 (custom)
Affected: 10.2.0 , < 10.2.22 (custom)
    cpe:2.3:a:tanium:endpoint_patch:3.17.10194:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.1.32:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.2.21:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Magic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15310",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T20:17:22.301449Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T20:17:29.236Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:endpoint_patch:3.17.10194:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.1.32:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.2.21:*:*:*:*:*:*:*"
          ],
          "product": "Patch Endpoint Tools",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "3.17.10195",
              "status": "affected",
              "version": "3.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.1.33",
              "status": "affected",
              "version": "10.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.2.22",
              "status": "affected",
              "version": "10.2.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Magic"
        }
      ],
      "dateAssigned": "2025-12-29T23:12:52.295Z",
      "datePublic": "2025-01-14T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T23:11:05.748Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-001",
          "url": "https://security.tanium.com/TAN-2025-001"
        }
      ],
      "title": "Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15310",
    "datePublished": "2026-02-09T23:00:51.789Z",
    "dateReserved": "2025-12-29T23:12:52.477Z",
    "dateUpdated": "2026-02-10T20:17:29.236Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15318 (GCVE-0-2025-15318)

Vulnerability from cvelistv5 – Published: 2026-02-09 22:56 – Updated: 2026-02-10 21:22
VLAI?
Title
Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools.
Summary
Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium End-User Notifications Endpoint Tools Affected: 1.18.0 , < 1.18.10079 (custom)
Affected: 10.0.0 , < 10.0.14 (custom)
Affected: 10.1.0 , < 10.1.20 (custom)
    cpe:2.3:a:tanium:endpoint_end-user-notifications:1.18.10078:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_end-user-notifications:10.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_end-user-notifications:10.1.19:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15318",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T21:21:53.649467Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T21:22:00.345Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:endpoint_end-user-notifications:1.18.10078:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_end-user-notifications:10.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_end-user-notifications:10.1.19:*:*:*:*:*:*:*"
          ],
          "product": "End-User Notifications Endpoint Tools",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.18.10079",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.0.14",
              "status": "affected",
              "version": "10.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.1.20",
              "status": "affected",
              "version": "10.1.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:57.784Z",
      "datePublic": "2025-05-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T23:11:46.729Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-017",
          "url": "https://security.tanium.com/TAN-2025-017"
        }
      ],
      "title": "Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15318",
    "datePublished": "2026-02-09T22:56:27.343Z",
    "dateReserved": "2025-12-29T23:12:57.929Z",
    "dateUpdated": "2026-02-10T21:22:00.345Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15319 (GCVE-0-2025-15319)

Vulnerability from cvelistv5 – Published: 2026-02-09 22:52 – Updated: 2026-02-10 21:21
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
Summary
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium Patch Endpoint Tools Affected: 3.17.0 , < 3.17.10207 (custom)
Affected: 10.1.0 , < 10.1.50 (custom)
Affected: 10.7.0 , < 10.7.25 (custom)
Affected: 10.9.0 , < 10.9.31 (custom)
Affected: 10.11.0 , < 10.11.27 (custom)
    cpe:2.3:a:tanium:endpoint_patch:3.17.10206:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.1.49:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.7.24:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.9.30:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:endpoint_patch:10.10.26:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Owen Jeanes
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15319",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T21:21:32.326259Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T21:21:40.851Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:endpoint_patch:3.17.10206:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.1.49:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.7.24:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.9.30:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:endpoint_patch:10.10.26:*:*:*:*:*:*:*"
          ],
          "product": "Patch Endpoint Tools",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "3.17.10207",
              "status": "affected",
              "version": "3.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.1.50",
              "status": "affected",
              "version": "10.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.7.25",
              "status": "affected",
              "version": "10.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.9.31",
              "status": "affected",
              "version": "10.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "10.11.27",
              "status": "affected",
              "version": "10.11.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Owen Jeanes"
        }
      ],
      "dateAssigned": "2025-12-29T23:12:58.700Z",
      "datePublic": "2025-08-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T23:09:49.225Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-021",
          "url": "https://security.tanium.com/TAN-2025-021"
        }
      ],
      "title": "Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15319",
    "datePublished": "2026-02-09T22:52:32.693Z",
    "dateReserved": "2025-12-29T23:12:58.866Z",
    "dateUpdated": "2026-02-10T21:21:40.851Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15316 (GCVE-0-2025-15316)

Vulnerability from cvelistv5 – Published: 2026-02-09 21:48 – Updated: 2026-02-10 15:59
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Tanium Server.
Summary
Tanium addressed a local privilege escalation vulnerability in Tanium Server.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Server Affected: 7.4.6.0 , < 7.4.6.1151 (custom)
Affected: 7.5.6.0 , < 7.5.6.1161 (custom)
Affected: 7.6.2.0 , < 7.6.2.1293 (custom)
Affected: 7.6.4.0 , < 7.6.4.2114 (custom)
    cpe:2.3:a:tanium:server:7.4.6.1150:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.5.6.1160:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.6.2.1292:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.6.4.2113:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15316",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T15:58:59.416693Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T15:59:23.904Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:server:7.4.6.1150:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.5.6.1160:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.6.2.1292:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.6.4.2113:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Server",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "7.4.6.1151",
              "status": "affected",
              "version": "7.4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.5.6.1161",
              "status": "affected",
              "version": "7.5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.2.1293",
              "status": "affected",
              "version": "7.6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.4.2114",
              "status": "affected",
              "version": "7.6.4.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:56.161Z",
      "datePublic": "2025-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a local privilege escalation vulnerability in Tanium Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T21:48:49.471Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-011",
          "url": "https://security.tanium.com/TAN-2025-011"
        }
      ],
      "title": "Tanium addressed a local privilege escalation vulnerability in Tanium Server."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15316",
    "datePublished": "2026-02-09T21:48:49.471Z",
    "dateReserved": "2025-12-29T23:12:56.327Z",
    "dateUpdated": "2026-02-10T15:59:23.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15315 (GCVE-0-2025-15315)

Vulnerability from cvelistv5 – Published: 2026-02-09 21:48 – Updated: 2026-02-10 16:59
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.
Summary
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Module Server Affected: 7.5.6.0 , < 7.5.6.1161 (custom)
Affected: 7.4.6.0 , < 7.4.6.1151 (custom)
Affected: 7.6.2.0 , < 7.6.2.1293 (custom)
Affected: 7.6.4.0 , < 7.6.4.2114 (custom)
    cpe:2.3:a:tanium:moduleserver:7.5.6.1160:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:moduleserver:7.4.6.1150:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:moduleserver:7.6.2.1292:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:moduleserver:7.6.4.2113:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15315",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T16:58:41.692979Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T16:59:35.140Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:moduleserver:7.5.6.1160:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:moduleserver:7.4.6.1150:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:moduleserver:7.6.2.1292:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:moduleserver:7.6.4.2113:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Module Server",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "7.5.6.1161",
              "status": "affected",
              "version": "7.5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.4.6.1151",
              "status": "affected",
              "version": "7.4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.2.1293",
              "status": "affected",
              "version": "7.6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.4.2114",
              "status": "affected",
              "version": "7.6.4.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:55.398Z",
      "datePublic": "2025-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a local privilege escalation vulnerability in Tanium Module Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T21:48:49.693Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-011",
          "url": "https://security.tanium.com/TAN-2025-011"
        }
      ],
      "title": "Tanium addressed a local privilege escalation vulnerability in Tanium Module Server."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15315",
    "datePublished": "2026-02-09T21:48:49.693Z",
    "dateReserved": "2025-12-29T23:12:55.559Z",
    "dateUpdated": "2026-02-10T16:59:35.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15317 (GCVE-0-2025-15317)

Vulnerability from cvelistv5 – Published: 2026-02-09 21:43 – Updated: 2026-02-10 16:01
VLAI?
Title
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server.
Summary
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Server Affected: 7.4.6.0 , < 7.4.6.1154 (custom)
Affected: 7.5.6.0 , < 7.5.6.1164 (custom)
Affected: 7.6.2.0 , < 7.6.2.1303 (custom)
Affected: 7.6.4.0 , < 7.6.4.2124 (custom)
    cpe:2.3:a:tanium:server:7.4.6.1153:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.5.6.1163:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.6.2.1302:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:server:7.6.4.2123:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15317",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T16:00:52.783721Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T16:01:34.788Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:server:7.4.6.1153:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.5.6.1163:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.6.2.1302:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:server:7.6.4.2123:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Server",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "7.4.6.1154",
              "status": "affected",
              "version": "7.4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.5.6.1164",
              "status": "affected",
              "version": "7.5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.2.1303",
              "status": "affected",
              "version": "7.6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.4.2124",
              "status": "affected",
              "version": "7.6.4.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:56.967Z",
      "datePublic": "2025-03-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T21:43:41.258Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-013",
          "url": "https://security.tanium.com/TAN-2025-013"
        }
      ],
      "title": "Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15317",
    "datePublished": "2026-02-09T21:43:41.258Z",
    "dateReserved": "2025-12-29T23:12:57.132Z",
    "dateUpdated": "2026-02-10T16:01:34.788Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15320 (GCVE-0-2025-15320)

Vulnerability from cvelistv5 – Published: 2026-02-06 19:18 – Updated: 2026-02-06 19:40
VLAI?
Title
Tanium addressed a denial of service vulnerability in Tanium Client.
Summary
Tanium addressed a denial of service vulnerability in Tanium Client.
CWE
  • CWE-605 - Multiple Binds to the Same Port
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Client Affected: 7.6.2.0 , < 7.6.2.1327 (custom)
Affected: 7.6.4.0 , < 7.6.4.2160 (custom)
Affected: 7.7.3.0 , < 7.7.3.8231 (custom)
Affected: 7.4.10.0 , < 7.4.10.1118 (custom)
    cpe:2.3:a:tanium:client:7.4.10.1116:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:client:7.6.2.1326:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:client:7.6.4.2159:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:client:7.7.3.8230:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Waeytens Frank Lycops Jean-Michel Huguet Jorge Escabias Justin Hocquel from NCIA/NCSC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15320",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:40:12.881671Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:40:46.455Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:client:7.4.10.1116:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:client:7.6.2.1326:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:client:7.6.4.2159:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:client:7.7.3.8230:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Client",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "7.6.2.1327",
              "status": "affected",
              "version": "7.6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.6.4.2160",
              "status": "affected",
              "version": "7.6.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.7.3.8231",
              "status": "affected",
              "version": "7.7.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.4.10.1118",
              "status": "affected",
              "version": "7.4.10.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Waeytens"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Frank Lycops"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jean-Michel Huguet"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jorge Escabias"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Justin Hocquel from NCIA/NCSC"
        }
      ],
      "dateAssigned": "2025-12-29T23:12:59.718Z",
      "datePublic": "2025-08-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a denial of service vulnerability in Tanium Client."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-605",
              "description": "Multiple Binds to the Same Port",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-06T19:18:13.493Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-023",
          "url": "https://security.tanium.com/TAN-2025-023"
        }
      ],
      "title": "Tanium addressed a denial of service vulnerability in Tanium Client."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15320",
    "datePublished": "2026-02-06T19:18:13.493Z",
    "dateReserved": "2025-12-29T23:12:59.888Z",
    "dateUpdated": "2026-02-06T19:40:46.455Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15311 (GCVE-0-2025-15311)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:26 – Updated: 2026-02-06 19:01
VLAI?
Title
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
Summary
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
CWE
  • CWE-150 - Improper Neutralization of Escape, Meta, or Control Sequences
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Appliance Affected: 1.8.3.0 , < 1.8.3.0146 (custom)
Affected: 1.8.4.0 , < 1.8.4.0149 (custom)
Affected: 1.8.5.0 , < 1.8.5.0212 (custom)
    cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:tanos:1.8.4.0148:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:tanos:1.8.5.0211:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15311",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:01:19.848854Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:01:30.739Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:tanos:1.8.4.0148:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:tanos:1.8.5.0211:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Appliance",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.8.3.0146",
              "status": "affected",
              "version": "1.8.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.4.0149",
              "status": "affected",
              "version": "1.8.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.5.0212",
              "status": "affected",
              "version": "1.8.5.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:52.865Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-150",
              "description": "Improper Neutralization of Escape, Meta, or Control Sequences",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:26:23.251Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-002",
          "url": "https://security.tanium.com/TAN-2025-002"
        }
      ],
      "title": "Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15311",
    "datePublished": "2026-02-05T18:26:23.251Z",
    "dateReserved": "2025-12-29T23:12:53.054Z",
    "dateUpdated": "2026-02-06T19:01:30.739Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15312 (GCVE-0-2025-15312)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:26 – Updated: 2026-02-06 19:02
VLAI?
Title
Tanium addressed an improper output sanitization vulnerability in TanOS.
Summary
Tanium addressed an improper output sanitization vulnerability in Tanium Appliance.
CWE
  • CWE-116 - Improper Encoding or Escaping of Output
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Appliance Affected: 1.8.3.0 , < 1.8.3.0146 (custom)
Affected: 1.8.4.0 , < 1.8.4.0157 (custom)
    cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:tanos:1.8.4.0156:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15312",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:02:02.740803Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:02:11.979Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:tanos:1.8.3.0145:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:tanos:1.8.4.0156:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Appliance",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.8.3.0146",
              "status": "affected",
              "version": "1.8.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.4.0157",
              "status": "affected",
              "version": "1.8.4.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:12:53.375Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper output sanitization vulnerability in Tanium Appliance."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-116",
              "description": "Improper Encoding or Escaping of Output",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:26:06.378Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-003",
          "url": "https://security.tanium.com/TAN-2025-003"
        }
      ],
      "title": "Tanium addressed an improper output sanitization vulnerability in TanOS."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15312",
    "datePublished": "2026-02-05T18:26:06.378Z",
    "dateReserved": "2025-12-29T23:12:53.559Z",
    "dateUpdated": "2026-02-06T19:02:11.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15324 (GCVE-0-2025-15324)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-06 19:03
VLAI?
Title
Tanium addressed a local privilege escalation vulnerability in Engage.
Summary
Tanium addressed a documentation issue in Engage.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium Engage Affected: 1.3.0 , < 1.3.37 (custom)
Affected: 1.6.0 , < 1.6.193 (custom)
    cpe:2.3:a:tanium:service_engage:1.3.36:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_engage:1.6.192:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15324",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:03:35.009129Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:03:42.971Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_engage:1.3.36:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_engage:1.6.192:*:*:*:*:*:*:*"
          ],
          "product": "Engage",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.3.37",
              "status": "affected",
              "version": "1.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.6.193",
              "status": "affected",
              "version": "1.6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:03.546Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed a documentation issue in Engage."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:25:52.474Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-004",
          "url": "https://security.tanium.com/TAN-2025-004"
        }
      ],
      "title": "Tanium addressed a local privilege escalation vulnerability in Engage."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15324",
    "datePublished": "2026-02-05T18:25:52.474Z",
    "dateReserved": "2025-12-29T23:13:03.776Z",
    "dateUpdated": "2026-02-06T19:03:42.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15325 (GCVE-0-2025-15325)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-06 19:04
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Discover.
Summary
Tanium addressed an improper input validation vulnerability in Discover.
CWE
  • CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
Impacted products
Vendor Product Version
Tanium Discover Affected: 4.10.0 , < 4.10.90 (custom)
    cpe:2.3:a:tanium:service_discover:4.10.89:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15325",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:04:36.861254Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:04:45.319Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_discover:4.10.89:*:*:*:*:*:*:*"
          ],
          "product": "Discover",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.10.90",
              "status": "affected",
              "version": "4.10.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:04.660Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper input validation vulnerability in Discover."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:25:29.908Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-005",
          "url": "https://security.tanium.com/TAN-2025-005"
        }
      ],
      "title": "Tanium addressed an improper input validation vulnerability in Discover."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15325",
    "datePublished": "2026-02-05T18:25:29.908Z",
    "dateReserved": "2025-12-29T23:13:04.840Z",
    "dateUpdated": "2026-02-06T19:04:45.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15327 (GCVE-0-2025-15327)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-06 19:10
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Deploy.
Summary
Tanium addressed an improper access controls vulnerability in Deploy.
CWE
Assigner
Impacted products
Vendor Product Version
Tanium Deploy Affected: 2.26.0 , < 2.26.1253 (custom)
Affected: 2.30.0 , < 2.30.150 (custom)
    cpe:2.3:a:tanium:service_deploy:2.26.1252:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_deploy:2.30.149:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15327",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:10:10.675713Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:10:18.914Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_deploy:2.26.1252:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_deploy:2.30.149:*:*:*:*:*:*:*"
          ],
          "product": "Deploy",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "2.26.1253",
              "status": "affected",
              "version": "2.26.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.30.150",
              "status": "affected",
              "version": "2.30.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:29.851Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper access controls vulnerability in Deploy."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:25:11.258Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-006",
          "url": "https://security.tanium.com/TAN-2025-006"
        }
      ],
      "title": "Tanium addressed an improper access controls vulnerability in Deploy."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15327",
    "datePublished": "2026-02-05T18:25:11.258Z",
    "dateReserved": "2025-12-29T23:13:30.151Z",
    "dateUpdated": "2026-02-06T19:10:18.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15326 (GCVE-0-2025-15326)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:25 – Updated: 2026-02-06 19:07
VLAI?
Title
Tanium addressed an improper access controls vulnerability in Patch.
Summary
Tanium addressed an improper access controls vulnerability in Patch.
CWE
Assigner
Impacted products
Vendor Product Version
Tanium Patch Affected: 3.17.0 , < 3.17.2262 (custom)
Affected: 3.19.0 , < 3.19.195 (custom)
    cpe:2.3:a:tanium:service_patch:3.17.2261:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_patch:3.19.194:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15326",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:07:15.349117Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:07:24.033Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_patch:3.17.2261:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_patch:3.19.194:*:*:*:*:*:*:*"
          ],
          "product": "Patch",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "3.17.2262",
              "status": "affected",
              "version": "3.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.19.195",
              "status": "affected",
              "version": "3.19.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:29.639Z",
      "datePublic": "2025-01-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper access controls vulnerability in Patch."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:25:11.487Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-006",
          "url": "https://security.tanium.com/TAN-2025-006"
        }
      ],
      "title": "Tanium addressed an improper access controls vulnerability in Patch."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15326",
    "datePublished": "2026-02-05T18:25:11.487Z",
    "dateReserved": "2025-12-29T23:13:29.803Z",
    "dateUpdated": "2026-02-06T19:07:24.033Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15328 (GCVE-0-2025-15328)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:24 – Updated: 2026-02-06 19:12
VLAI?
Title
Tanium addressed an improper link resolution before file access vulnerability in Enforce.
Summary
Tanium addressed an improper link resolution before file access vulnerability in Enforce.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Tanium Enforce Affected: 2.7.0 , < 2.7.314 (custom)
Affected: 2.8.0 , < 2.8.544 (custom)
    cpe:2.3:a:tanium:service_enforce:2.7.313:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_enforce:2.8.543:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15328",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:12:46.298503Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:12:54.357Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_enforce:2.7.313:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_enforce:2.8.543:*:*:*:*:*:*:*"
          ],
          "product": "Enforce",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "2.7.314",
              "status": "affected",
              "version": "2.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.8.544",
              "status": "affected",
              "version": "2.8.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:30.169Z",
      "datePublic": "2025-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper link resolution before file access vulnerability in Enforce."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:24:42.534Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-007",
          "url": "https://security.tanium.com/TAN-2025-007"
        }
      ],
      "title": "Tanium addressed an improper link resolution before file access vulnerability in Enforce."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15328",
    "datePublished": "2026-02-05T18:24:42.534Z",
    "dateReserved": "2025-12-29T23:13:30.399Z",
    "dateUpdated": "2026-02-06T19:12:54.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15330 (GCVE-0-2025-15330)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:24 – Updated: 2026-02-06 19:13
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Deploy.
Summary
Tanium addressed an improper input validation vulnerability in Deploy.
CWE
Assigner
Impacted products
Vendor Product Version
Tanium Deploy Affected: 2.26.0 , < 2.26.1279 (custom)
Affected: 2.30.0 , < 2.30.175 (custom)
    cpe:2.3:a:tanium:service_deploy:2.26.1278:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_deploy:2.30.174:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15330",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:13:20.790327Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:13:31.613Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_deploy:2.26.1278:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_deploy:2.30.174:*:*:*:*:*:*:*"
          ],
          "product": "Deploy",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "2.26.1279",
              "status": "affected",
              "version": "2.26.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.30.175",
              "status": "affected",
              "version": "2.30.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:30.875Z",
      "datePublic": "2025-03-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper input validation vulnerability in Deploy."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:24:27.066Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-012",
          "url": "https://security.tanium.com/TAN-2025-012"
        }
      ],
      "title": "Tanium addressed an improper input validation vulnerability in Deploy."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15330",
    "datePublished": "2026-02-05T18:24:27.066Z",
    "dateReserved": "2025-12-29T23:13:31.023Z",
    "dateUpdated": "2026-02-06T19:13:31.613Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15331 (GCVE-0-2025-15331)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:23 – Updated: 2026-02-06 19:14
VLAI?
Title
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
Summary
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
CWE
Assigner
Impacted products
Vendor Product Version
Tanium Connect Affected: 5.22.0 , < 5.22.100 (custom)
Affected: 5.26.0 , < 5.26.87 (custom)
    cpe:2.3:a:tanium:service_connect:5.22.99:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_connect:5.26.86:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15331",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:14:45.363886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:14:52.895Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_connect:5.22.99:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_connect:5.26.86:*:*:*:*:*:*:*"
          ],
          "product": "Connect",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "5.22.100",
              "status": "affected",
              "version": "5.22.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.26.87",
              "status": "affected",
              "version": "5.26.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:31.267Z",
      "datePublic": "2025-04-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an uncontrolled resource consumption vulnerability in Connect."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-459",
              "description": "Incomplete Cleanup",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:23:51.939Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-015",
          "url": "https://security.tanium.com/TAN-2025-015"
        }
      ],
      "title": "Tanium addressed an uncontrolled resource consumption vulnerability in Connect."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15331",
    "datePublished": "2026-02-05T18:23:51.939Z",
    "dateReserved": "2025-12-29T23:13:31.408Z",
    "dateUpdated": "2026-02-06T19:14:52.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15329 (GCVE-0-2025-15329)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:23 – Updated: 2026-02-06 19:15
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
CWE
  • CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
Impacted products
Vendor Product Version
Tanium Threat Response Affected: 4.5.0 , < 4.5.250 (custom)
Affected: 4.6.0 , < 4.6.518 (custom)
Affected: 4.9.0 , < 4.9.297 (custom)
    cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:15:31.703269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:15:39.292Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*"
          ],
          "product": "Threat Response",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.5.250",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.518",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.297",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:30.479Z",
      "datePublic": "2025-07-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an information disclosure vulnerability in Threat Response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:23:27.646Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-019",
          "url": "https://security.tanium.com/TAN-2025-019"
        }
      ],
      "title": "Tanium addressed an information disclosure vulnerability in Threat Response."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15329",
    "datePublished": "2026-02-05T18:23:27.646Z",
    "dateReserved": "2025-12-29T23:13:30.646Z",
    "dateUpdated": "2026-02-06T19:15:39.292Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15332 (GCVE-0-2025-15332)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:22 – Updated: 2026-02-06 17:37
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
CWE
  • CWE-532 - Insertion of Sensitive Information into Log File
Assigner
Impacted products
Vendor Product Version
Tanium Threat Response Affected: 4.5.0 , < 4.5.250 (custom)
Affected: 4.6.0 , < 4.6.518 (custom)
Affected: 4.9.0 , < 4.9.297 (custom)
    cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15332",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T17:37:00.739296Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T17:37:09.090Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_threatresponse:4.5.249:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.6.517:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.9.296:*:*:*:*:*:*:*"
          ],
          "product": "Threat Response",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.5.250",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.518",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.297",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:31.819Z",
      "datePublic": "2025-07-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an information disclosure vulnerability in Threat Response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:22:45.788Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-020",
          "url": "https://security.tanium.com/TAN-2025-020"
        }
      ],
      "title": "Tanium addressed an information disclosure vulnerability in Threat Response."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15332",
    "datePublished": "2026-02-05T18:22:45.788Z",
    "dateReserved": "2025-12-29T23:13:31.979Z",
    "dateUpdated": "2026-02-06T17:37:09.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15321 (GCVE-0-2025-15321)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:20 – Updated: 2026-02-06 17:37
VLAI?
Title
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
Summary
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CWE
Assigner
Impacted products
Vendor Product Version
Tanium Tanium Appliance Affected: 1.8.3.0 , < 1.8.3.0196 (custom)
Affected: 1.8.5.0 , < 1.8.5.0199 (custom)
Affected: 1.8.5.0 , < 1.8.5.0227 (custom)
    cpe:2.3:a:tanium:tanos:1.8.3.0195:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:tanos:1.8.5.0198:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:tanos:1.8.5.0226:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Waeytens Frank Lycops Jean-Michel Huguet Jorge Escabias Justin Hocquel from NCIA/NCSC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15321",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T17:37:17.139008Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T17:37:27.718Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:tanos:1.8.3.0195:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:tanos:1.8.5.0198:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:tanos:1.8.5.0226:*:*:*:*:*:*:*"
          ],
          "product": "Tanium Appliance",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.8.3.0196",
              "status": "affected",
              "version": "1.8.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.5.0199",
              "status": "affected",
              "version": "1.8.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.8.5.0227",
              "status": "affected",
              "version": "1.8.5.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Waeytens"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Frank Lycops"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jean-Michel Huguet"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jorge Escabias"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Justin Hocquel from NCIA/NCSC"
        }
      ],
      "dateAssigned": "2025-12-29T23:13:00.595Z",
      "datePublic": "2025-08-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an improper input validation vulnerability in Tanium Appliance."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:20:39.404Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-024",
          "url": "https://security.tanium.com/TAN-2025-024"
        }
      ],
      "title": "Tanium addressed an improper input validation vulnerability in Tanium Appliance."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15321",
    "datePublished": "2026-02-05T18:20:39.404Z",
    "dateReserved": "2025-12-29T23:13:00.749Z",
    "dateUpdated": "2026-02-06T17:37:27.718Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15333 (GCVE-0-2025-15333)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:20 – Updated: 2026-02-06 17:37
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Threat Response Affected: 4.5.0 , < 4.5.266 (custom)
Affected: 4.6.0 , < 4.6.536 (custom)
Affected: 4.9.0 , < 4.9.324 (custom)
    cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Waeytens Frank Lycops Jean-Michel Huguet Jorge Escabias Justin Hocquel from NCIA/NCSC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15333",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T17:37:34.407949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T17:37:41.457Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
          ],
          "product": "Threat Response",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.5.266",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.536",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.324",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Waeytens"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Frank Lycops"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jean-Michel Huguet"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jorge Escabias"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Justin Hocquel from NCIA/NCSC"
        }
      ],
      "dateAssigned": "2025-12-29T23:13:32.264Z",
      "datePublic": "2025-08-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an information disclosure vulnerability in Threat Response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:20:14.854Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-025",
          "url": "https://security.tanium.com/TAN-2025-025"
        }
      ],
      "title": "Tanium addressed an information disclosure vulnerability in Threat Response."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15333",
    "datePublished": "2026-02-05T18:20:14.854Z",
    "dateReserved": "2025-12-29T23:13:32.432Z",
    "dateUpdated": "2026-02-06T17:37:41.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15334 (GCVE-0-2025-15334)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:18 – Updated: 2026-02-06 18:15
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Threat Response Affected: 4.5.0 , < 4.5.266 (custom)
Affected: 4.6.0 , < 4.6.536 (custom)
Affected: 4.9.0 , < 4.9.324 (custom)
    cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Waeytens Frank Lycops Jean-Michel Huguet Jorge Escabias Justin Hocquel from NCIA/NCSC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15334",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:15:15.985229Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:15:24.622Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
          ],
          "product": "Threat Response",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.5.266",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.536",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.324",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Waeytens"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Frank Lycops"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jean-Michel Huguet"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jorge Escabias"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Justin Hocquel from NCIA/NCSC"
        }
      ],
      "dateAssigned": "2025-12-29T23:13:32.895Z",
      "datePublic": "2025-08-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an information disclosure vulnerability in Threat Response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:18:04.149Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-026",
          "url": "https://security.tanium.com/TAN-2025-026"
        }
      ],
      "title": "Tanium addressed an information disclosure vulnerability in Threat Response."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15334",
    "datePublished": "2026-02-05T18:18:04.149Z",
    "dateReserved": "2025-12-29T23:13:33.075Z",
    "dateUpdated": "2026-02-06T18:15:24.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15335 (GCVE-0-2025-15335)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:17 – Updated: 2026-02-06 18:15
VLAI?
Title
Tanium addressed an information disclosure vulnerability in Threat Response.
Summary
Tanium addressed an information disclosure vulnerability in Threat Response.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Threat Response Affected: 4.5.0 , < 4.5.266 (custom)
Affected: 4.6.0 , < 4.6.536 (custom)
Affected: 4.9.0 , < 4.9.324 (custom)
    cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Filip Waeytens Frank Lycops Jean-Michel Huguet Jorge Escabias Justin Hocquel at NCIA/NCSC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15335",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:15:31.106351Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:15:40.477Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_threatresponse:4.5.265:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.6.535:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_threatresponse:4.9.323:*:*:*:*:*:*:*"
          ],
          "product": "Threat Response",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.5.266",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.536",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.324",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Filip Waeytens"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Frank Lycops"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jean-Michel Huguet"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Jorge Escabias"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Justin Hocquel at NCIA/NCSC"
        }
      ],
      "dateAssigned": "2025-12-29T23:13:47.658Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an information disclosure vulnerability in Threat Response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:17:28.244Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-027",
          "url": "https://security.tanium.com/TAN-2025-027"
        }
      ],
      "title": "Tanium addressed an information disclosure vulnerability in Threat Response."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15335",
    "datePublished": "2026-02-05T18:17:28.244Z",
    "dateReserved": "2025-12-29T23:13:47.826Z",
    "dateUpdated": "2026-02-06T18:15:40.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15339 (GCVE-0-2025-15339)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Discover.
Summary
Tanium addressed an incorrect default permissions vulnerability in Discover.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Discover Affected: 4.10.0 , < 4.10.118 (custom)
    cpe:2.3:a:tanium:service_discover:4.10.117:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15339",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:16:10.826569Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:16:20.430Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_discover:4.10.117:*:*:*:*:*:*:*"
          ],
          "product": "Discover",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "4.10.118",
              "status": "affected",
              "version": "4.10.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:48.931Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Discover."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:29.455Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Discover."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15339",
    "datePublished": "2026-02-05T18:16:29.455Z",
    "dateReserved": "2025-12-29T23:13:49.089Z",
    "dateUpdated": "2026-02-06T18:16:20.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15341 (GCVE-0-2025-15341)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
Summary
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Benchmark Affected: 2.7.0 , < 2.7.98 (custom)
Affected: 2.9.0 , < 2.9.188 (custom)
Affected: 2.12.0 , < 2.12.82 (custom)
    cpe:2.3:a:tanium:service_benchmark:2.7.97:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_benchmark:2.9.187:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_benchmark:2.12.81:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15341",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:15:48.362020Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:16:03.547Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_benchmark:2.7.97:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_benchmark:2.9.187:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_benchmark:2.12.81:*:*:*:*:*:*:*"
          ],
          "product": "Benchmark",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "2.7.98",
              "status": "affected",
              "version": "2.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.9.188",
              "status": "affected",
              "version": "2.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.12.82",
              "status": "affected",
              "version": "2.12.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:49.756Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Benchmark."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:29.666Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Benchmark."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15341",
    "datePublished": "2026-02-05T18:16:29.666Z",
    "dateReserved": "2025-12-29T23:13:49.910Z",
    "dateUpdated": "2026-02-06T18:16:03.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15340 (GCVE-0-2025-15340)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Comply.
Summary
Tanium addressed an incorrect default permissions vulnerability in Comply.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Comply Affected: 2.24.0 , < 2.24.159 (custom)
Affected: 2.29.0 , < 2.29.124 (custom)
Affected: 2.32.0 , < 2.32.155 (custom)
    cpe:2.3:a:tanium:service_comply:2.24.158:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_comply:2.29.123:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_comply:2.32.154:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15340",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:16:27.924175Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:16:35.695Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_comply:2.24.158:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_comply:2.29.123:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_comply:2.32.154:*:*:*:*:*:*:*"
          ],
          "product": "Comply",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "2.24.159",
              "status": "affected",
              "version": "2.24.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.29.124",
              "status": "affected",
              "version": "2.29.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.32.155",
              "status": "affected",
              "version": "2.32.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:49.256Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Comply."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:29.226Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Comply."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15340",
    "datePublished": "2026-02-05T18:16:29.226Z",
    "dateReserved": "2025-12-29T23:13:49.402Z",
    "dateUpdated": "2026-02-06T18:16:35.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15338 (GCVE-0-2025-15338)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 18:16
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Partner Integration.
Summary
Tanium addressed an incorrect default permissions vulnerability in Partner Integration.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Partner Integration Affected: 1.0.0 , < 1.0.224 (custom)
Affected: 1.2.0 , < 1.2.33 (custom)
Affected: 1.3.0 , < 1.3.40 (custom)
    cpe:2.3:a:tanium:service_partnerintegration:1.0.223:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_partnerintegration:1.2.32:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_partnerintegration:1.3.39:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15338",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:16:45.717676Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:16:55.535Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_partnerintegration:1.0.223:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_partnerintegration:1.2.32:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_partnerintegration:1.3.39:*:*:*:*:*:*:*"
          ],
          "product": "Partner Integration",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.0.224",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.2.33",
              "status": "affected",
              "version": "1.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.3.40",
              "status": "affected",
              "version": "1.3.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:48.583Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Partner Integration."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:28.993Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Partner Integration."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15338",
    "datePublished": "2026-02-05T18:16:28.993Z",
    "dateReserved": "2025-12-29T23:13:48.747Z",
    "dateUpdated": "2026-02-06T18:16:55.535Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15337 (GCVE-0-2025-15337)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 19:19
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Patch.
Summary
Tanium addressed an incorrect default permissions vulnerability in Patch.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Patch Affected: 3.17.0 , < 3.17.2300 (custom)
Affected: 3.19.0 , < 3.19.232 (custom)
Affected: 3.24.0 , < 3.24.137 (custom)
    cpe:2.3:a:tanium:service_patch:3.17.2299:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_patch:3.19.231:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_patch:3.24.136:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15337",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:18:55.436355Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:19:06.782Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_patch:3.17.2299:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_patch:3.19.231:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_patch:3.24.136:*:*:*:*:*:*:*"
          ],
          "product": "Patch",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "3.17.2300",
              "status": "affected",
              "version": "3.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.19.232",
              "status": "affected",
              "version": "3.19.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.24.137",
              "status": "affected",
              "version": "3.24.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:48.304Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Patch."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:28.498Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Patch."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15337",
    "datePublished": "2026-02-05T18:16:28.498Z",
    "dateReserved": "2025-12-29T23:13:48.471Z",
    "dateUpdated": "2026-02-06T19:19:06.782Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-15336 (GCVE-0-2025-15336)

Vulnerability from cvelistv5 – Published: 2026-02-05 18:16 – Updated: 2026-02-06 19:18
VLAI?
Title
Tanium addressed an incorrect default permissions vulnerability in Performance.
Summary
Tanium addressed an incorrect default permissions vulnerability in Performance.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Tanium Performance Affected: 1.17.0 , < 1.17.134 (custom)
Affected: 1.21.0 , < 1.21.141 (custom)
Affected: 1.22.0 , < 1.22.288 (custom)
    cpe:2.3:a:tanium:service_performance:1.17.133:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_performance:1.21.140:*:*:*:*:*:*:*
    cpe:2.3:a:tanium:service_performance:1.22.287:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15336",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T19:18:10.721453Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T19:18:19.103Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:tanium:service_performance:1.17.133:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_performance:1.21.140:*:*:*:*:*:*:*",
            "cpe:2.3:a:tanium:service_performance:1.22.287:*:*:*:*:*:*:*"
          ],
          "product": "Performance",
          "vendor": "Tanium",
          "versions": [
            {
              "lessThan": "1.17.134",
              "status": "affected",
              "version": "1.17.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.21.141",
              "status": "affected",
              "version": "1.21.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.22.288",
              "status": "affected",
              "version": "1.22.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "dateAssigned": "2025-12-29T23:13:47.970Z",
      "datePublic": "2025-09-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Tanium addressed an incorrect default permissions vulnerability in Performance."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-05T18:16:28.770Z",
        "orgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
        "shortName": "Tanium"
      },
      "references": [
        {
          "name": "TAN-2025-029",
          "url": "https://security.tanium.com/TAN-2025-029"
        }
      ],
      "title": "Tanium addressed an incorrect default permissions vulnerability in Performance."
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3938794e-25f5-4123-a1ba-5cbd7f104512",
    "assignerShortName": "Tanium",
    "cveId": "CVE-2025-15336",
    "datePublished": "2026-02-05T18:16:28.770Z",
    "dateReserved": "2025-12-29T23:13:48.142Z",
    "dateUpdated": "2026-02-06T19:18:19.103Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}