CVE-2026-6392
Received Received - Intake
Information Disclosure Vulnerability in Tanium Threat Response

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: Tanium

Description
Tanium addressed an information disclosure vulnerability in Threat Response.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
tanium threat_response to 4.6.577 (exc)
tanium threat_response to 4.9.379 (exc)
tanium threat_response to 4.12.251 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The vulnerability is addressed by applying updates to Tanium Threat Response. Specifically, update to Update 23 (v4.6.577) or later for the 2024H2 release, Update 17 (v4.9.379) or later for the 2025H1 release, or Update 7 (v4.12.251) or later for the 2025H2 release.

No workarounds or alternative mitigations are available according to the provided information.


Can you explain this vulnerability to me?

CVE-2026-6392 is an information disclosure vulnerability in Tanium Threat Response.

It allows an authenticated Tanium user who has the "Threat Response Configs - Read" permission to gain unauthorized read-only access to data beyond their intended scope.

This vulnerability has a low severity with a CVSS 3.1 base score of 2.7.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of information to users who should not have access to certain data within Tanium Threat Response.

Specifically, users with the "Threat Response Configs - Read" permission might view sensitive data beyond their authorized scope, potentially exposing confidential or sensitive information.

There are no known workarounds or mitigations available for this vulnerability other than applying the updates provided by Tanium.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

CVE-2026-6392 is an information disclosure vulnerability that requires an authenticated Tanium user with specific permissions to exploit. Detection would involve verifying user permissions and monitoring for unauthorized access attempts.

No specific detection commands or network/system scanning methods are provided in the available resources.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated Tanium user with specific read permissions to access data beyond their intended scope, which could potentially lead to unauthorized information disclosure.

Such unauthorized data access may impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls on access to sensitive information to protect privacy and confidentiality.

However, the provided information does not explicitly state the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart