Description
Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension.
Published: 2026-02-19
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential memory corruption
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 02 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Tanium cloud Workloads
CPEs cpe:2.3:a:tanium:cloud_workloads:*:*:*:*:*:*:*:*
Vendors & Products Tanium cloud Workloads

Thu, 19 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension.
Title Use-after-free in Cloud Workloads
First Time appeared Tanium
Tanium service Cloudworkloads
Weaknesses CWE-416
CPEs cpe:2.3:a:tanium:service_cloudworkloads:1.0.221:*:*:*:*:*:*:*
Vendors & Products Tanium
Tanium service Cloudworkloads
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Tanium Cloud Workloads Service Cloudworkloads
cve-icon MITRE

Status: PUBLISHED

Assigner: Tanium

Published:

Updated: 2026-03-02T15:55:09.813Z

Reserved: 2026-02-12T13:49:49.307Z

Link: CVE-2026-2408

cve-icon Vulnrichment

Updated: 2026-03-02T15:55:02.625Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T00:16:17.930

Modified: 2026-02-27T21:56:07.003

Link: CVE-2026-2408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:45:44Z

Weaknesses