PatchSiren cyber security CVE debrief
CVE-2026-6392 Tanium CVE debrief
CVE-2026-6392 is a low-severity information disclosure issue in Tanium Threat Response. NVD lists a CVSS 3.1 score of 2.7 with network attack vector, low attack complexity, and high privileges required. The affected ranges published by NVD are Threat Response versions 4.6.0 through 4.6.577 and 4.9.0 through 4.9.379. Tanium’s advisory is referenced by NVD, and the CVE was published on 2026-04-22 and last modified in NVD on 2026-05-11. Because the issue is confidentiality-only and requires high privileges, it is best treated as a remediation item for already-privileged or administrative environments rather than an emergency exposure.
- Vendor
- Tanium
- Product
- CVE-2026-6392
- CVSS
- LOW 2.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-22
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-04-22
- Advisory updated
- 2026-05-11
Who should care
Security teams and administrators running Tanium Threat Response, especially environments on the affected 4.6.x or 4.9.x release lines. Organizations that rely on Tanium for endpoint visibility and incident response should verify installed versions and review any privileged access paths to the product.
Technical summary
NVD describes the flaw as an information disclosure vulnerability in Tanium Threat Response, mapped to CWE-200. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N, indicating a network-reachable issue that requires high privileges, does not need user interaction, and impacts confidentiality only. NVD’s CPE ranges identify affected versions as 4.6.0 through 4.6.577 and 4.9.0 through 4.9.379. The official vendor advisory is Tanium reference TAN-2026-011.
Defensive priority
Medium-low. The issue is low severity and requires high privileges, but it still affects a security operations product and can expose sensitive information. Plan remediation during the next regular maintenance cycle unless your deployment has unusual privilege exposure or strict confidentiality requirements.
Recommended defensive actions
- Confirm whether any Tanium Threat Response installations are on versions 4.6.0-4.6.577 or 4.9.0-4.9.379.
- Review Tanium advisory TAN-2026-011 and apply the vendor-recommended fix or upgrade path.
- Prioritize remediation on systems with broader administrative access, shared operator accounts, or elevated integrations.
- Validate after update that the deployed Threat Response version is outside the vulnerable ranges.
- If immediate patching is not possible, restrict administrative access to Threat Response and monitor privileged activity around the product.
Evidence notes
All claims here are derived from the supplied NVD record and Tanium vendor advisory reference. NVD lists the vulnerability as analyzed, with CVSS 3.1 vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N and weakness CWE-200. The NVD record also provides the affected CPE version ranges and the Tanium advisory link TAN-2026-011. No exploit details or unverified impact claims are included.
Official resources
-
CVE-2026-6392 CVE record
CVE.org
-
CVE-2026-6392 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
3938794e-25f5-4123-a1ba-5cbd7f104512 - Vendor Advisory
Published from official CVE/NVD data with Tanium advisory reference; CVE published 2026-04-22 and NVD modified 2026-05-11. This debrief is based only on the supplied corpus and official links.