CVE-2026-6416
Uncontrolled Resource Consumption in Tanium Interact Causes Denial of Service
Publication date: 2026-04-22
Last updated on: 2026-05-06
Assigner: Tanium
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tanium | interact | From 3.2.0 (inc) to 3.2.202 (exc) |
| tanium | interact | From 3.5.0 (inc) to 3.5.108 (exc) |
| tanium | interact | From 3.8.0 (inc) to 3.8.47 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update Tanium Interact to a fixed version. The vulnerability is addressed in Update 23 (v3.2.202) and later for the 2024H2 release, Update 17 (v3.5.108) and later for the 2025H1 release, and Update 7 (v3.8.47) and later for the 2025H2 release.
No workarounds or other mitigations are provided.
Can you explain this vulnerability to me?
CVE-2026-6416 is an uncontrolled resource consumption vulnerability in Tanium Interact. It allows an authenticated user with the "Write Filter Group" permission to perform a denial of service (DoS) attack by exhausting system resources on the Interact workbench.
This vulnerability has a low severity with a CVSS 3.1 base score of 2.7.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling a denial of service (DoS) attack on the Tanium Interact workbench. This means that an authenticated user with specific permissions can exhaust system resources, potentially causing the Interact service to become unavailable or degraded.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability can be mitigated by applying the available updates to Tanium Interact.
- Update to Update 23 (v3.2.202) or later for the 2024H2 release.
- Update to Update 17 (v3.5.108) or later for the 2025H1 release.
- Update to Update 7 (v3.8.47) or later for the 2025H2 release.
No workarounds or other mitigations are provided.
Can you explain this vulnerability to me?
CVE-2026-6416 is an uncontrolled resource consumption vulnerability in Tanium Interact. It allows an authenticated user with the "Write Filter Group" permission to perform a denial of service (DoS) attack by exhausting system resources on the Interact workbench.
This vulnerability affects versions of Interact prior to Update 23 (v3.2.202) in the 2024H2 release, prior to Update 17 (v3.5.108) in the 2025H1 release, and prior to Update 7 (v3.8.47) in the 2025H2 release.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling a denial of service (DoS) attack on the Tanium Interact workbench. An attacker with the required permissions can exhaust system resources, potentially causing the service to become unavailable or degraded.
This could disrupt normal operations and affect availability of the Interact platform.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this vulnerability is to apply the available updates for Tanium Interact.
- Update to Update 23 (v3.2.202) or later for the 2024H2 release.
- Update to Update 17 (v3.5.108) or later for the 2025H1 release.
- Update to Update 7 (v3.8.47) or later for the 2025H2 release.
No workarounds or other mitigations are provided.
Can you explain this vulnerability to me?
CVE-2026-6416 is an uncontrolled resource consumption vulnerability in Tanium Interact. It allows an authenticated user with the "Write Filter Group" permission to perform a denial of service (DoS) attack by exhausting system resources in the Interact workbench.
This vulnerability has a low severity with a CVSS 3.1 base score of 2.7.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling a denial of service (DoS) attack on the Tanium Interact workbench, which could disrupt normal operations by exhausting system resources.
Only authenticated users with the "Write Filter Group" permission can exploit this vulnerability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability can be mitigated by applying the available updates for Tanium Interact.
- Update to Update 23 (v3.2.202) or later for the 2024H2 release.
- Update to Update 17 (v3.5.108) or later for the 2025H1 release.
- Update to Update 7 (v3.8.47) or later for the 2025H2 release.
No workarounds or other mitigations are provided.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-6416 is an uncontrolled resource consumption vulnerability in Tanium Interact. It allows an authenticated user with the "Write Filter Group" permission to perform a denial of service (DoS) attack by exhausting system resources on the Interact workbench.
This vulnerability has a low severity with a CVSS 3.1 base score of 2.7.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling a denial of service (DoS) attack on the Tanium Interact workbench. An authenticated user with specific permissions can exhaust system resources, potentially disrupting normal operations and availability of the Interact service.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on your network or system.