CVE-2025-15330
Published: 05 February 2026
Summary
CVE-2025-15330 is a high-severity Missing Authorization (CWE-862) vulnerability in Tanium Deploy. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper input validation vulnerability by requiring validation and corrective action on all information inputs to ensure consistency with expected content.
Addresses the specific CVE by requiring timely identification, reporting, and risk-based remediation of software flaws like this high-severity input validation issue.
Complements input validation by restricting the types and quantities of information permitted at system interfaces, reducing the attack surface for malformed inputs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization (CWE-862) in Tanium Deploy with low-priv network access enables remote service exploitation and privilege escalation to achieve high C/I/A impact.
NVD Description
Tanium addressed an improper input validation vulnerability in Deploy.
Deeper analysisAI
CVE-2025-15330 is an improper input validation vulnerability, classified under CWE-862, affecting Tanium Deploy. Tanium addressed this issue, which was published on 2026-02-05 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), marking it as high severity due to its potential for significant impact.
The vulnerability can be exploited by an attacker with low privileges (PR:L) over the network (AV:N), requiring low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially allowing unauthorized access, data modification, or disruption of Tanium Deploy services.
Tanium's security advisory TAN-2025-012 provides details on mitigation, available at https://security.tanium.com/TAN-2025-012.
Details
- CWE(s)