Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-2605

Summary
Assigner-Tanium
Assigner Org ID-3938794e-25f5-4123-a1ba-5cbd7f104512
Published At-19 Feb, 2026 | 23:10
Updated At-19 Feb, 2026 | 23:13
Rejected At-
Credits

Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.

Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Tanium
Assigner Org ID:3938794e-25f5-4123-a1ba-5cbd7f104512
Published At:19 Feb, 2026 | 23:10
Updated At:19 Feb, 2026 | 23:13
Rejected At:
â–¼CVE Numbering Authority (CNA)
Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.

Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.

Affected Products
Vendor
Tanium
Product
TanOS
CPEs
  • cpe:2.3:a:tanium:tanos:1.8.4.0249:*:*:*:*:*:*:*
  • cpe:2.3:a:tanium:tanos:1.8.5.0282:*:*:*:*:*:*:*
  • cpe:2.3:a:tanium:tanos:1.8.6.0150:*:*:*:*:*:*:*
Versions
Affected
  • From 1.8.4 before 1.8.4.0249 (custom)
  • From 1.8.5 before 1.8.5.0282 (custom)
  • From 1.8.6 before 1.8.6.0150 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-532Insertion of Sensitive Information into Log File
Type: CWE
CWE ID: CWE-532
Description: Insertion of Sensitive Information into Log File
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.tanium.com/TAN-2026-006
N/A
Hyperlink: https://security.tanium.com/TAN-2026-006
Resource: N/A
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:3938794e-25f5-4123-a1ba-5cbd7f104512
Published At:20 Feb, 2026 | 00:16
Updated At:20 Feb, 2026 | 19:33

Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

tanium
tanium
>>tanos>>Versions from 1.8.4(inclusive) to 1.8.4.0249(exclusive)
cpe:2.3:o:tanium:tanos:*:*:*:*:*:*:*:*
tanium
tanium
>>tanos>>Versions from 1.8.5(inclusive) to 1.8.5.0282(exclusive)
cpe:2.3:o:tanium:tanos:*:*:*:*:*:*:*:*
tanium
tanium
>>tanos>>Versions from 1.8.6\*(inclusive) to 1.8.6.0150(inclusive)
cpe:2.3:o:tanium:tanos:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-532Secondary3938794e-25f5-4123-a1ba-5cbd7f104512
CWE ID: CWE-532
Type: Secondary
Source: 3938794e-25f5-4123-a1ba-5cbd7f104512
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.tanium.com/TAN-2026-0063938794e-25f5-4123-a1ba-5cbd7f104512
Vendor Advisory
Hyperlink: https://security.tanium.com/TAN-2026-006
Source: 3938794e-25f5-4123-a1ba-5cbd7f104512
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

11Records found

CVE-2026-2350
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 8.75%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 23:10
Updated-20 Feb, 2026 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.

Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.

Action-Not Available
Vendor-Tanium
Product-InteractTDS
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2026-1292
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 8.75%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 23:10
Updated-20 Feb, 2026 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an insertion of sensitive information into log file vulnerability in Trends.

Tanium addressed an insertion of sensitive information into log file vulnerability in Trends.

Action-Not Available
Vendor-Tanium
Product-Trends
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-15332
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Matching Score-6
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-4.9||MEDIUM
EPSS-0.04% / 11.83%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:22
Updated-10 Feb, 2026 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an information disclosure vulnerability in Threat Response.

Tanium addressed an information disclosure vulnerability in Threat Response.

Action-Not Available
Vendor-taniumTanium
Product-threat_responseThreat Response
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2020-25640
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.35% / 57.29%
||
7 Day CHG~0.00%
Published-24 Nov, 2020 | 19:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-wildflywildfly
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2024-38321
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 22.98%
||
7 Day CHG~0.00%
Published-03 Aug, 2024 | 13:34
Updated-06 Sep, 2024 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Business Automation Workflow information disclosure

IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.

Action-Not Available
Vendor-IBM Corporation
Product-business_automation_workflowBusiness Automation Workflow
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2021-32767
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 55.16%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 16:00
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure in User Authentication

TYPO3 is an open source PHP based web content management system. In versions 9.0.0 through 9.5.27, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0, user credentials may been logged as plain-text. This occurs when explicitly using log level debug, which is not the default configuration. TYPO3 versions 9.5.28, 10.4.18, 11.3.1 contain a patch for this vulnerability.

Action-Not Available
Vendor-TYPO3 Association
Product-typo3TYPO3.CMS
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-13611
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-2||LOW
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 19:45
Updated-10 Dec, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insertion of Sensitive Information into Log File in GitLab

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.2 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that could have allowed an authenticated user with access to certain logs to obtain sensitive tokens under specific conditions.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2024-9621
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.82%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:26
Updated-20 Nov, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Io.quarkiverse.cxf:quarkus-cxf: quarkus cxf may log user password and secret to application log

A vulnerability was found in Quarkus CXF. Passwords and other secrets may appear in the application log in spite of the user configuring them to be hidden. This issue requires some special configuration to be vulnerable, such as SOAP logging enabled, application set client, and endpoint logging properties, and the attacker must have access to the application log.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Build of Apache Camel 4.4 for Quarkus 3.8
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2024-0716
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.1||LOW
EPSS-0.06% / 19.69%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 15:00
Updated-21 Oct, 2024 | 12:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Byzoro Smart S150 Management Platform Backup File download.php information disclosure

A vulnerability classified as problematic has been found in Byzoro Smart S150 Management Platform V31R02B15. This affects an unknown part of the file /log/download.php of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-251541 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-byzoroByzorobyzoro
Product-smart_s150_firmwaresmart_s150Smart S150 Management Platformsmart_s150
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2022-31047
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.39% / 59.66%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 20:40
Updated-23 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insertion of Sensitive Information into Log File in typo3/cms-core

TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.

Action-Not Available
Vendor-TYPO3 Association
Product-typo3typo3
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2022-26907
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.74% / 72.57%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 19:05
Updated-02 Jan, 2025 | 18:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure SDK for .NET Information Disclosure Vulnerability

Azure SDK for .NET Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_sdk_for_.netAzure SDK for .Net
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
Details not found