CVE-2025-15331
Unknown Unknown - Not Provided
Uncontrolled Resource Consumption in Tanium Connect Causes Denial of Service

Publication date: 2026-02-05

Last updated on: 2026-02-10

Assigner: Tanium

Description
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-10
Generated
2026-05-06
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tanium connect From 5.22.0 (inc) to 5.22.100 (exc)
tanium connect From 5.26.0 (inc) to 5.26.87 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-459 The product does not properly "clean up" and remove temporary or supporting resources after they have been used.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15331 is an uncontrolled resource consumption vulnerability in Tanium Connect. It allows an authenticated Tanium user with Connect Write permission to consume an unlimited amount of disk space on the Tanium Management Server (TMS). This can lead to resource exhaustion on the server.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an authenticated user to exhaust disk space on the Tanium Management Server. This uncontrolled resource consumption can degrade system performance, cause service disruptions, or potentially lead to denial of service conditions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or methods provided to identify this vulnerability on your network or system.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Tanium Connect to a fixed version.

  • Upgrade to Connect v5.22.100 or later for the 7.4 and 7.5 releases.
  • Upgrade to Update 16 (v5.22.100) or later for the 2024H1 release.
  • Upgrade to Update 5 (v5.26.87) or later for the 2024H2 release.

No workarounds or other mitigations are available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart