Cyber Posture

CVE-2025-15344

Medium

Published: 29 January 2026

Published
29 January 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0001 3.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15344 is a medium-severity SQL Injection (CWE-89) vulnerability in Tanium Asset. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in a network-accessible Asset component directly maps to exploitation of a public-facing (or remotely reachable) application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Tanium addressed a SQL injection vulnerability in Asset.

Deeper analysisAI

CVE-2025-15344 is a SQL injection vulnerability (CWE-89) affecting the Asset component in Tanium software. Tanium has addressed the issue, with the CVE published on 2026-01-29T00:16:06.930. The vulnerability carries a CVSS v3.1 base score of 6.3, rated as AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L.

An attacker with low privileges (PR:L) and network access (AV:N) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) within the unchanged scope (S:U), enabling SQL injection to potentially manipulate database queries.

Tanium's security advisory TAN-2025-035 provides details on the vulnerability and mitigation, available at https://security.tanium.com/TAN-2025-035.

Details

CWE(s)

Affected Products

tanium
asset
≤ 1.28.254 · 1.32 — 1.32.161 · 1.33 — 1.33.250

CVEs Like This One

CVE-2026-2435Same product: Tanium Asset
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89
CVE-2025-7636Shared CWE-89
CVE-2026-35614Shared CWE-89

References