Impact
The flaw allows the Interact and TDS components to record sensitive data such as credentials or tokens into log files without sanitization. This loss of confidentiality can expose privileged information to anyone who can read the logs, including administrators and compromised accounts. The weakness is catalogued as a log‑file management issue (CWE‑532) and does not provide direct code execution or denial‑of‑service capabilities, but the leakage of confidential data can compromise system integrity and privacy.
Affected Systems
The vulnerability affects Tanium Interact and Tanium TDS. No specific version ranges are supplied, so all installations of these components should be reviewed and updated when a patch becomes available.
Risk and Exploitability
Rated with a CVSS score of 6.5, the vulnerability is moderately severe but unlikely to be actively exploited, as indicated by an EPSS score of less than 1% and its absence from the CISA KEV catalog. Exploitation would require the attacker to trigger the logging path and obtain access to the log files, meaning privileged or compromised accounts provide the simplest attack vectors. In environments where logs are exposed to wider audiences or stored in insecure locations, the risk is higher, whereas tight log access controls reduce the likelihood of a data leak.
OpenCVE Enrichment