Impact
Tanium has identified a use‑after‑free flaw in the Cloud Workloads Enforce client extension that can corrupt memory. The weakness is categorized as CWE‑416. The description does not detail specific exploitation steps, but a use‑after‑free condition typically permits a malicious entity to manipulate program behavior once the freed memory has been reallocated.
Affected Systems
The vulnerability affects Tanium’s Cloud Workloads product, specifically the Enforce client extension. It is present in the service_cloudworkloads version 1.0.221. No other specific versions are listed in the advisory; vendors are advised to review all releases of the Cloud Workloads service for the presence of the patch that addresses the flaw.
Risk and Exploitability
The CVSS score of 4.7 indicates a moderate severity, while the EPSS score of less than 1% reflects a low likelihood of exploitation at this time. The vulnerability is not included in the CISA KEV catalog. Based on the nature of a use‑after‑free flaw and the absence of explicit attack‑vector details, the likely exploitation scenario involves remote interaction with the Cloud Workloads service, potentially requiring crafted input to trigger the memory corruption.
OpenCVE Enrichment