Impact
Tanium has reported an improper input validation flaw in its Discover component, classified as CWE‑1284. The defect allows data that is not properly checked to enter the system, potentially leading to unpredicted application behavior such as data corruption or erratic responses. The CVSS score of 2.7 indicates a low severity, suggesting that the vulnerability is unlikely to provide a direct compromise path but can still produce operational disruptions if exploited. Based on the description, it is inferred that the attacker could craft input that triggers misprocessing, causing unintended state changes within the platform.
Affected Systems
The flaw affects Tanium Discover in all deployed versions, as the CPE indicates no version restriction. For Tanium Service Asset, the specified affected releases are 4.10.133 and 4.15.129. Administrators should verify the exact product versions in use and apply any available patches or newer releases that contain the fix.
Risk and Exploitability
With a CVSS score of 2.7 and an EPSS probability of less than 1%, the likelihood of exploitation is very low and no public exploits are known. The vulnerability is not listed in the CISA KEV catalog, reinforcing its low threat profile. The likely attack vector involves supplying malformed or specially crafted input through a user‑facing interface or API, which typically requires authenticated or privileged access to the Tanium platform. Consequently, while the risk remains low, it is prudent to remediate the issue promptly.
OpenCVE Enrichment