Description
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.
Published: 2026-02-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Patch
AI Analysis

Impact

The flaw allows the Interact and TDS components to record sensitive data such as credentials or tokens into log files without sanitization. This loss of confidentiality can expose privileged information to anyone who can read the logs, including administrators and compromised accounts. The weakness is catalogued as a log‑file management issue (CWE‑532) and does not provide direct code execution or denial‑of‑service capabilities, but the leakage of confidential data can compromise system integrity and privacy.

Affected Systems

The vulnerability affects Tanium Interact and Tanium TDS. No specific version ranges are supplied, so all installations of these components should be reviewed and updated when a patch becomes available.

Risk and Exploitability

Rated with a CVSS score of 6.5, the vulnerability is moderately severe but unlikely to be actively exploited, as indicated by an EPSS score of less than 1% and its absence from the CISA KEV catalog. Exploitation would require the attacker to trigger the logging path and obtain access to the log files, meaning privileged or compromised accounts provide the simplest attack vectors. In environments where logs are exposed to wider audiences or stored in insecure locations, the risk is higher, whereas tight log access controls reduce the likelihood of a data leak.

Generated by OpenCVE AI on April 16, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or update for Tanium Interact and Tanium TDS that addresses log‑file sanitization.
  • Restrict logging of sensitive information by configuring the applications to omit passwords, tokens, or other confidential data, or by disabling verbose logging in production environments.
  • Audit existing log files for exposed secrets and rotate credentials, tokens, or keys that may have been inadvertently recorded.
  • Enable monitoring for anomalous log entries that contain sensitive data and establish alerting to detect potential leaks.

Generated by OpenCVE AI on April 16, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 02 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 28 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tanium:interact:*:*:*:*:*:*:*:*

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tanium interact
Tanium tds
Vendors & Products Tanium interact
Tanium tds

Thu, 19 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.
Title Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.
First Time appeared Tanium
Tanium service Interact
Tanium service Tds
Weaknesses CWE-532
CPEs cpe:2.3:a:tanium:service_interact:3.2.195:*:*:*:*:*:*:*
cpe:2.3:a:tanium:service_interact:3.5.101:*:*:*:*:*:*:*
cpe:2.3:a:tanium:service_tds:4.1.256:*:*:*:*:*:*:*
Vendors & Products Tanium
Tanium service Interact
Tanium service Tds
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Tanium Interact Service Interact Service Tds Tds
cve-icon MITRE

Status: PUBLISHED

Assigner: Tanium

Published:

Updated: 2026-03-02T15:50:27.043Z

Reserved: 2026-02-11T16:04:36.872Z

Link: CVE-2026-2350

cve-icon Vulnrichment

Updated: 2026-03-02T15:50:17.548Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T00:16:17.780

Modified: 2026-02-27T23:48:19.057

Link: CVE-2026-2350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:45:25Z

Weaknesses