runZero Platform Superuser Privilege Escalation (CVE-2026-5373)
CVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.
CVE-2026-5373 is an improper privilege management vulnerability affecting the runZero platform. This vulnerability allows administrators with “all-organization” privileges to escalate the privileges of other accounts to superuser status. This could allow a malicious or compromised administrator account to gain complete control over the runZero platform instance. The vulnerability is classified as CWE-269 (Improper Privilege Management) and has a CVSS v3.1 score of 8.1 (High). The vulnerability was patched in runZero Platform version 4.0.260202.0. This issue allows an attacker with admin access to gain complete control over the platform.
Attack Chain
- An attacker gains administrative access to a runZero platform instance with “all-organization” privileges. This could be achieved through compromised credentials or other means.
- The attacker navigates to the user management section of the runZero platform.
- The attacker selects a target user account.
- The attacker uses the “promote to superuser” functionality, which due to the vulnerability, does not have proper validation.
- The runZero platform incorrectly elevates the target user’s privileges to superuser.
- The attacker logs in as the newly promoted superuser account.
- The attacker now has full control over the runZero platform, including access to sensitive data and the ability to modify system configurations.
Impact
Successful exploitation of CVE-2026-5373 allows an attacker with compromised administrator credentials to escalate privileges to superuser, gaining complete control over the runZero platform. This could lead to the exposure of sensitive asset data, the modification of network configurations, and potentially the compromise of other systems connected to the runZero platform. The exact number of affected organizations is unknown, but all installations prior to version 4.0.260202.0 are potentially vulnerable.
Recommendation
- Upgrade all runZero platform instances to version 4.0.260202.0 or later to patch CVE-2026-5373.
- Monitor runZero platform logs for any unusual activity related to user privilege changes. Enable process creation logging to detect unusual activity.
- Implement multi-factor authentication for all runZero administrator accounts to reduce the risk of credential compromise.
- Deploy the Sigma rule to detect potential exploitation attempts by monitoring for unexpected user role changes.
- Review and restrict administrator privileges according to the principle of least privilege.
Detection coverage 2
Detect runZero Superuser Privilege Escalation Attempt
highDetects attempts to exploit CVE-2026-5373 by monitoring for unexpected user role changes in runZero platform logs.
Detect runZero Admin API Access
mediumDetects access to runZero admin APIs, which may indicate malicious activity.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
2
url
| Type | Value |
|---|---|
| url | https://help.runzero.com/docs/release-notes/#402602020 |
| url | https://www.runzero.com/advisories/runzero-platform-su-privesc-cve-2026-5373/ |
| [email protected] |