<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35099 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35099/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 16:23:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35099/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)</title><link>https://feed.craftedsignal.io/briefs/2026-04-lakeside-systrack-lpe/</link><pubDate>Wed, 01 Apr 2026 16:23:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lakeside-systrack-lpe/</guid><description>Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.</description><content:encoded><![CDATA[<p>Lakeside SysTrack Agent, a system monitoring tool, contains a local privilege escalation vulnerability. Specifically, versions of Agent 11 prior to 11.2.1.28 are susceptible to a race condition (CWE-362) that can be exploited by a local attacker to gain SYSTEM privileges. This vulnerability, identified as CVE-2026-35099, allows an attacker with limited privileges to execute arbitrary code with the highest level of permissions on the system. Successful exploitation could lead to complete system compromise, data theft, and other malicious activities. Organizations using vulnerable versions of the SysTrack Agent should upgrade to the patched version (11.2.1.28) as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to the target system, possibly through phishing or social engineering.</li>
<li>The attacker identifies the presence of a vulnerable Lakeside SysTrack Agent version (prior to 11.2.1.28).</li>
<li>The attacker crafts a malicious executable or script designed to trigger the race condition within the SysTrack Agent.</li>
<li>The attacker executes the malicious code, which attempts to manipulate shared resources concurrently with the SysTrack Agent.</li>
<li>The race condition is successfully triggered, allowing the attacker to overwrite critical system files or inject malicious code into the SysTrack Agent&rsquo;s process.</li>
<li>Due to the race condition, the SysTrack Agent executes the attacker&rsquo;s injected code with SYSTEM privileges.</li>
<li>The attacker leverages SYSTEM privileges to install a backdoor, create new administrative accounts, or perform other malicious activities.</li>
<li>The attacker achieves persistent SYSTEM-level access, enabling them to control the compromised system remotely.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35099 allows an attacker to escalate privileges from a normal user to SYSTEM on a vulnerable Windows system. This gives the attacker complete control over the system, potentially leading to data breaches, malware installation, or denial of service. Given the nature of system monitoring agents, a successful compromise can provide deep insights into the organization&rsquo;s environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Lakeside SysTrack Agent to version 11.2.1.28 or later to remediate CVE-2026-35099, as mentioned in the Lakeside documentation (<a href="https://documentation.lakesidesoftware.com/en/Content/Release%20Notes/Agent/11.2.1.28%20Hotfix%20Agent%20Release%20Notes.htm?tocpath=Release%20Notes%7CAgent%7C_____8">https://documentation.lakesidesoftware.com/en/Content/Release%20Notes/Agent/11.2.1.28%20Hotfix%20Agent%20Release%20Notes.htm?tocpath=Release%20Notes%7CAgent%7C_____8</a>).</li>
<li>Implement the provided Sigma rule to detect potential exploitation attempts by monitoring for suspicious process creation events associated with SysTrack Agent.</li>
<li>Monitor for unexpected file modifications or registry changes performed by the SysTrack Agent process, which could indicate successful exploitation of the race condition.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lakeside</category><category>systrack</category><category>privilege-escalation</category><category>race-condition</category><category>cve-2026-35099</category><category>windows</category></item></channel></rss>