Skip to content
Threat Feed

Tag

Privilege-Escalation

336 briefs RSS
high advisory

Argo Workflows Template Referencing Restriction Bypass

Argo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.

argo-workflows kubernetes privilege-escalation defense-evasion
3r 2t 1c
critical threat

Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)

A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.

exploited MOVEit Automation +3 authentication-bypass privilege-escalation cve-2026-4670 cve-2026-5174 webserver
2r 2t 2c
high advisory

Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)

A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.

Norton Secure VPN privilege-escalation windows vulnerability
2r 1t 1c
high advisory

Multiple Vulnerabilities in Progress Software MOVEit Automation

Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.

MOVEit Automation vulnerability privilege-escalation defense-evasion
2r 2t
high advisory

Potential Chroot Container Escape via Mount

The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.

Elastic Defend +2 container-escape privilege-escalation linux
2r
high advisory

Chroot Execution in Container Context on Linux

Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.

Elastic Defend +1 container-escape privilege-escalation linux chroot
2r 1t
high advisory

WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.

WP Mail Gateway plugin wordpress privilege-escalation plugin-vulnerability
2r 1t 1c
high advisory

WordPress Import and Export Users Plugin Privilege Escalation Vulnerability

A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.

Import and export users and customers plugin privilege-escalation wordpress cloud
2r 1t 1c
critical advisory

CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.

Amazon Linux 2023 +3 privilege-escalation linux kernel
2r 1t 1c
high advisory

AWS IAM Privilege Operations via Lambda Execution Role

Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.

AWS IAM +1 aws iam lambda privilege-escalation persistence
2r 3t
high advisory

Potential Root Effective Shell from Non-Standard Path via Auditd

This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.

Auditd Manager privilege-escalation linux auditd
2r 1t
critical advisory

IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)

IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.

Turbonomic Application Resource Management +1 privilege-escalation credential-access kubernetes vulnerability
2r 2t 1c
medium advisory

IBM Langflow Desktop Unauthenticated Image Access via IDOR

IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to an indirect object reference (IDOR) vulnerability (CVE-2026-4503), allowing unauthenticated users to view other users' images due to a user-controlled key.

Langflow Desktop idor vulnerability privilege-escalation
2r 1t 1c
high advisory

Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes

A vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.

Contrast CLI +2 kata-containers container-security privilege-escalation
2r 2t
high advisory

Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket

This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.

Auditbeat +1 privilege-escalation linux vulnerability cve-2026-31431
2r 2t 1c
critical threat

Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel

A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.

Linux kernel +4 Theori privilege-escalation linux vulnerability
2r 1t 1c
high threat

Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation

A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.

Windows RPC privilege-escalation windows unpatched-vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution

Multiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.

FreeBSD OS vulnerability privilege-escalation code-execution
3r 3t
high advisory

Multiple Vulnerabilities in Absolute Secure Access

Multiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.

Secure Access vulnerability privilege-escalation denial-of-service information-disclosure
2r 3t 1c
high advisory

Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation

Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.

Cyber Protect Cloud Agent privilege-escalation acronis agent
2r 1t 2c
high threat

Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS

Multiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.

exploited SonicOS sonicwall vulnerability privilege-escalation denial-of-service
2r 3t 3c
critical advisory

Multiple Vulnerabilities in CUPS

Multiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.

CUPS vulnerability privilege-escalation execution denial-of-service
2r 4t 1c
high advisory

CUPS Vulnerability Allows Local Privilege Escalation

A local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.

CUPS privilege-escalation linux macos
2r 1t
high advisory

Sudo Privilege Escalation Vulnerabilities

Multiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.

sudo privilege-escalation linux
2r 1t 2c
high advisory

PackageKit Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.

PackageKit privilege-escalation linux
2r 1t
high advisory

Multiple Vulnerabilities in Xen and Citrix Systems XenServer

Multiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.

XenServer +1 vulnerability privilege-escalation denial-of-service information-disclosure
3r 7t
critical advisory

Multiple Vulnerabilities in Red Hat Linux Kernel

Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.

Red Hat CodeReady Linux Builder +1 vulnerability kernel redhat execution privilege-escalation denial-of-service
2r 3t 5c
high advisory

Multiple Vulnerabilities in MISP Threat Intelligence Platform

Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.

MISP < 2.5.37 misp vulnerability sqli privilege-escalation security-policy-bypass
2r 1t
high advisory

OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.

OpenClaw vulnerability privilege-escalation execution
2r 1t 1c
high advisory

OpenClaw Role Bypass Vulnerability in device.token.rotate Function

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.

OpenClaw role-bypass privilege-escalation cve-2026-42422
2r 1t 1c
high advisory

OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.

OpenClaw privilege-escalation authentication cve-2026-41404
2r 1t 1c
high advisory

OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.

OpenClaw cve-2026-41380 execution-approval-bypass privilege-escalation defense-evasion
2r 3t 1c
high advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.

OpenClaw privilege-escalation cve-2026-42432
2r 1t 1c
high advisory

OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.

OpenClaw privilege-escalation vulnerability
2r 1t 1c
high advisory

OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)

OpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.

OpenClaw allowlist bypass privilege escalation cve-2026-41390
2r 2t 1c
high advisory

AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)

A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.

AVACAST dll-hijacking privilege-escalation code-execution
2r 1t 1c
medium advisory

Google Workspace Login Attempt with Government Attack Warning

A Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.

Google Workspace googleworkspace intrusion initial-access persistence privilege-escalation
2r 1t
medium advisory

Linux Persistence via Sudoers.d File Manipulation

Attackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.

persistence privilege-escalation linux sudoers
3r 2t
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
critical advisory

PhantomRPC: Windows RPC Privilege Escalation Vulnerability

A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.

Windows privilege-escalation rpc
2r 1t
high advisory

WeKan Missing Authorization Vulnerability in Integration REST API

WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.

WeKan missing-authorization rest-api privilege-escalation
2r 1t 1c 4i
high advisory

NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)

A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.

ntfs-3g heap-overflow privilege-escalation linux
2r 1t 1c
medium advisory

FreeScout Privilege Escalation via Email Address Reassignment (CVE-2026-40589)

FreeScout versions before 1.8.214 are vulnerable to privilege escalation, allowing a low-privileged agent to reassign email addresses from hidden customers to visible customers, leading to information disclosure and unauthorized access to conversations.

privilege-escalation cve-2026-40589 freescout
2r 1t 1c 1i
critical advisory

ASP.NET Core Improper Signature Verification Vulnerability (CVE-2026-40372)

CVE-2026-40372 is a critical vulnerability in ASP.NET Core stemming from improper cryptographic signature verification, potentially enabling unauthorized attackers to achieve network-based privilege escalation.

aspnet privilege-escalation cve-2026-40372 signature-bypass
2r 1t 1c
high advisory

pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)

pyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.

pyLoad privilege-escalation CVE-2026-41133
2r 1t 1c
critical advisory

Esri Portal for ArcGIS Incorrect Authorization Vulnerability (CVE-2026-33519)

CVE-2026-33519 is a critical vulnerability in Esri Portal for ArcGIS 11.4, 11.5, and 12.0, where incorrect authorization checks on developer credentials can lead to unauthorized privilege escalation on Windows, Linux, and Kubernetes deployments.

esri arcgis privilege-escalation incorrect-authorization cve-2026-33519 webserver
2r 1t 1c
critical advisory

Crafty Controller Users API Insecure Direct Object Reference Vulnerability

Crafty Controller's Users API component contains an insecure direct object reference vulnerability, allowing a remote, authenticated attacker to perform unauthorized user modification actions due to improper API permissions validation (CVE-2026-5652).

idor privilege-escalation cve-2026-5652
2r 1t 1c 1i
critical threat

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface, allowing an attacker to upload a malicious file and overwrite arbitrary files to gain vmanage user privileges.

exploited Catalyst SD-WAN Manger cve-2026-20122 privilege-escalation sd-wan
2r 2t 1c
critical advisory

Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager allow a remote, anonymous, or local attacker to gain administrator privileges, bypass authentication, execute commands with Netadmin rights, read sensitive system information, and overwrite arbitrary files.

cisco sdwan vulnerability privilege-escalation
2r 4t
critical advisory

Multiple Vulnerabilities in Dell PowerProtect Data Domain OS

Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.

dell powerprotect datadomain vulnerability privilege-escalation defense-evasion credential-access impact
2r 4t
high advisory

Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities

A local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.

intel firmware vulnerability privilege-escalation credential-access
2r 2t
high advisory

AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)

CVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.

privilege-escalation vulnerability AiAssistant
2r 2t 1c
high advisory

FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)

FreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.

freescout css-injection privilege-escalation cve-2026-40497
2r 2t 1c
critical advisory

compressing npm Package Symlink Bypass Vulnerability

A vulnerability in the `compressing` npm package (<=v2.1.0) allows for arbitrary file overwrite via symlink path traversal, bypassing a previous patch for CVE-2026-24884.

npm supply-chain symlink directory-traversal privilege-escalation arbitrary-file-overwrite
3r 5t 1c 1i
critical advisory

NovumOS MemoryMapRange Privilege Escalation Vulnerability (CVE-2026-40572)

A vulnerability exists in NovumOS versions prior to 0.24 where the MemoryMapRange syscall allows user-mode processes to map arbitrary virtual address ranges, including kernel structures, leading to privilege escalation.

privilege-escalation novumOS CVE-2026-40572
2r 1t 1c
critical advisory

NovumOS Local Privilege Escalation via Unvalidated Syscall

A local privilege escalation vulnerability exists in NovumOS versions before 0.24, where Syscall 12 (JumpToUser) lacks input validation, allowing user-mode processes to execute arbitrary code in kernel mode.

privilege-escalation syscall novumos
3r 1t 1c
high advisory

Movary Privilege Escalation Vulnerability (CVE-2026-40349)

Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.

privilege-escalation web-application cve-2026-40349
2r 1t 1c 1i
high advisory

FastGPT NoSQL Injection Vulnerability in Password Change Endpoint

FastGPT versions prior to 4.14.9.5 are vulnerable to NoSQL injection in the password change endpoint, allowing authenticated attackers to bypass password verification and perform account takeover.

nosql-injection account-takeover cve fastgpt privilege-escalation
2r 2t 1c
high advisory

xrdp Privilege Escalation Vulnerability (CVE-2026-32107)

xrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.

xrdp privilege-escalation cve-2026-32107 linux
2r 2t 1c 1i
high advisory

Kyverno ConfigMap Cross-Namespace Read RBAC Bypass (CVE-2026-22039 Incomplete Fix)

CVE-2026-22039 incompletely fixed a cross-namespace privilege escalation vulnerability in Kyverno's apiCall context, as the ConfigMap context loader still lacks namespace validation, allowing a namespace admin to read ConfigMaps from any namespace using Kyverno's privileged service account, leading to a complete RBAC bypass in multi-tenant Kubernetes clusters.

kyverno rbac-bypass kubernetes privilege-escalation
2r 1t 1c
high advisory

Better Auth OAuth Provider Authorization Bypass Vulnerability

An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.

oauth authorization bypass privilege-escalation defense-evasion
2r 2t
high advisory

Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability

Dell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.

privilege-escalation vulnerability dell
2r 1t 1c
high advisory

Dell Storage Manager Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in Dell Storage Manager to escalate their privileges on the system.

privilege-escalation dell storage manager
2r 1t
critical advisory

Paperclip Cross-Tenant Agent API Key IDOR Vulnerability

A Paperclip API vulnerability allows a board user from one company to create, list, and revoke agent API keys in another company, leading to full cross-tenant compromise due to insufficient authorization checks on `/agents/:id/keys` routes.

idor cross-tenant api paperclip privilege-escalation
3r 5t
high advisory

Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)

Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.

weblate privilege-escalation web-application
2r 2t 1c
critical advisory

Multiple Vulnerabilities in Kyverno Allow Privilege Escalation and Data Manipulation

An authenticated remote attacker can exploit multiple vulnerabilities in Kyverno to disclose information, bypass security measures, manipulate data, and gain elevated privileges.

kyverno kubernetes privilege-escalation data-manipulation
3r 6t
critical threat

Microsoft April 2026 Patch Tuesday Addresses 163 Vulnerabilities

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including 8 critical ones, ranging from Tampering to Remote Code Execution and Privilege Escalation, affecting various Microsoft products; it is recommended to apply patches immediately.

exploited patch-tuesday vulnerability remote-code-execution privilege-escalation windows
2r 4t 6c
critical advisory

AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)

The AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.

wordpress privilege-escalation acymailing
2r 1t 1c
critical advisory

Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)

The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.

wordpress privilege-escalation cve-2026-3596 plugin
2r 2t 1c
critical advisory

Simopro WinMatrix Agent Missing Authentication Vulnerability (CVE-2026-6348)

The WinMatrix agent by Simopro Technology suffers from a missing authentication vulnerability (CVE-2026-6348), enabling local authenticated attackers to execute arbitrary code with SYSTEM privileges on the local machine and all hosts within the agent's environment.

CVE-2026-6348 missing-authentication privilege-escalation windows
2r 2t 1c
high advisory

wger Broken Access Control in Global Gym Configuration Update Endpoint

The wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.

privilege-escalation broken-access-control web-application
2r 1t
critical advisory

ArgoCD Image Updater Namespace Bypass Vulnerability (CVE-2026-6388)

CVE-2026-6388 describes a flaw in ArgoCD Image Updater that allows an attacker with permissions to create or modify an ImageUpdater resource in a multi-tenant environment to bypass namespace boundaries and trigger unauthorized image updates.

argocd privilege-escalation kubernetes cve-2026-6388
2r 1t 1c
critical advisory

Barracuda RMM Privilege Escalation via Filesystem ACLs

Barracuda RMM versions prior to 2025.2.2 are vulnerable to local privilege escalation, allowing attackers to gain SYSTEM privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory.

privilege-escalation rmm windows
2r 1t 1c
high advisory

Velociraptor Authentication Bypass via query() Plugin

Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.

velociraptor authentication bypass privilege escalation cve-2026-6290
2r 2t 1c
high advisory

Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)

CVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.

cve privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)

CVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.

cve-2026-26173 privilege-escalation windows
2r 1t 1c
high advisory

Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)

CVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

cve-2026-33104 privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)

CVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)

CVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)

CVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.

privilege-escalation windows cve-2026-32076
2r 1t 1c
high threat

Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)

CVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.

exploited cve-2026-32068 privilege-escalation windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)

CVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.

privilege escalation race condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)

CVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.

cve-2026-26172 privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)

CVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)

CVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.

privilege-escalation toctou windows
2r 1t 1c 1i
high advisory

Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)

CVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.

privilege-escalation kerberos windows cve-2026-27912
2r 1t 1c 2i
high advisory

Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)

CVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.

privilege-escalation windows cve-2026-27914
2r 1t 1c 1i
high advisory

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)

CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.

privilege-escalation microsoft-defender cve-2026-33825
2r 1t 1c 1i
high advisory

CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler

CVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c 2i
high advisory

CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.

cve-2026-33099 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver

CVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation

CVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows cve-2026-32195
2r 1t 1c 1i
high advisory

CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation

CVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.

cve-2026-32164 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation

CVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation

CVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.

cve-2026-32153 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32152 Use-After-Free in Desktop Window Manager

CVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.

privilege-escalation use-after-free cve-2026-32152
2r 1t 1c 1i
high advisory

CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege

A use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.

cve-2026-32078 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation

CVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.

privilege-escalation race-condition windows
3r 1t 1c
high threat

CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability

CVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.

exploited cve-2026-27917 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-27916 Use-After-Free in Windows UPnP Device Host

CVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.

windows upnp privilege-escalation cve-2026-27916
2r 1t 1c 1i
high advisory

CVE-2026-27910: Windows Installer Local Privilege Escalation

CVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.

privilege-escalation windows cve-2026-27910
2r 1t 1c 2i
high advisory

CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation

CVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver

A use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.

cve-2026-27908 use-after-free privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability

CVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26179 Windows Kernel Double Free Privilege Escalation

CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.

privilege-escalation windows kernel double-free
2r 1t 1c
high advisory

CVE-2026-26163: Windows Kernel Double Free Privilege Escalation

CVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.

privilege-escalation windows cve-2026-26163
2r 1t 1c 1i
high advisory

CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation

CVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.

efs privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26152: Windows Cryptographic Services Privilege Escalation

CVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.

cve-2026-26152 privilege-escalation windows
2r 1t 1c 1i
high advisory

Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)

CVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.

azure privilege escalation vulnerability cve-2026-32168
2r 1t 1c 1i
high advisory

Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation

CVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.

cve-2026-32192 azure monitor agent privilege escalation deserialization
2r 1t 1c
high advisory

Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)

CVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.

privilege-escalation windows cve-2026-32222
2r 1t 1c 1i
high advisory

CVE-2026-26183 Windows RPC API Local Privilege Escalation

CVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.

privilege-escalation windows rpc
2r 1t 1c 1i
high advisory

Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174

CVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.

cve-2026-26174 privilege-escalation windows wsus
2r 1t 1c 2i
high advisory

Adobe Connect XSS Vulnerability Leading to Privilege Escalation

Adobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.

adobe-connect xss cve-2026-34617 privilege-escalation
2r 1t 1c
high advisory

CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

cve-2026-33100 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32224 Use-After-Free in Windows Server Update Service

CVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.

cve-2026-32224 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)

CVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.

privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32165 Use-After-Free in Windows User Interface Core

CVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

Windows COM Privilege Escalation via CVE-2026-32162

CVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.

privilege-escalation windows CVE-2026-32162
2r 1t 1c 2i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)

CVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)

CVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

CVE-2026-32087 Function Discovery Service Privilege Escalation

CVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.

privilege-escalation heap-overflow cve windows
2r 1t 1c
high advisory

CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)

CVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.

windows privilege-escalation cve
2r 1t 1c 2i
high advisory

Windows Shell Race Condition Vulnerability (CVE-2026-27918)

CVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

race-condition privilege-escalation windows
2r 1t 1c
high advisory

Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)

CVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.

cve-2026-26184 privilege-escalation windows
2r 1t 1c 1i
critical advisory

Windows WARP Integer Truncation Privilege Escalation (CVE-2026-26178)

CVE-2026-26178 is an integer size truncation vulnerability in the Windows Advanced Rasterization Platform (WARP) that allows an unauthorized attacker to elevate privileges locally.

privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-26176 Windows CSC Driver Privilege Escalation

CVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows
2r 1t 1c 1i
high advisory

Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159

CVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).

cve-2026-26159 privilege-escalation windows
2r 1t 1c 1i
critical advisory

Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)

A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.

path-traversal vulnerability privilege-escalation fortinet
2r 1t 1c 2i
high advisory

RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)

CVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.

ruggedcom privilege-escalation cve-2026-27668 sam-p
2r 1t 1c
high advisory

CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)

CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.

privilege-escalation web-application cve
2r 1t 1c
high advisory

Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)

Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.

privilege-escalation web-application CVE-2026-33706
2r 1t 1c
critical advisory

BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)

The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.

wordpress buddypress privilege-escalation cve-2026-5144 cloud
2r 1t 1c
critical advisory

LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects

A vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.

lxd privilege-escalation container-escape cve-2026-34178
2r 1t
high advisory

OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.

cve-2026-35660 openclaw access-control privilege-escalation
2r 1t 1c 5i
high advisory

Samsung MagicINFO 9 Server Local Privilege Escalation via Incorrect Default Permissions (CVE-2026-25203)

Samsung MagicINFO 9 Server versions prior to 21.1091.1 are susceptible to a local privilege escalation vulnerability due to incorrect default permissions, potentially allowing a low-privilege user to gain elevated privileges on the system.

privilege-escalation samsung magicinfo
2r 1t 1c 1i
critical advisory

Juniper Junos OS MX Series Missing Authorization Vulnerability

CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.

privilege-escalation network juniper
2r 1t 1c
critical advisory

Nix Package Manager Arbitrary File Overwrite Vulnerability

A flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.

nix privilege-escalation linux vulnerability
2r 1t 2c
high advisory

Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)

A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.

path traversal code execution privilege escalation sleuth kit CVE-2026-40024
2r 3t 1c
high advisory

InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)

A non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.

inventree privilege-escalation cve-2026-35476
2r 1t 1c 1i
medium advisory

Kibana Fleet Plugin Privilege Escalation via CVE-2026-4498

CVE-2026-4498 allows an authenticated Kibana user with Fleet sub-feature privileges to read index data beyond their direct Elasticsearch RBAC scope due to improper privilege handling in debug route handlers.

cve privilege-escalation kibana
2r 1t 1c 1i
high advisory

Unauthenticated Access to kcp Cache Server

The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.

kcp kubernetes cache authentication authorization privilege-escalation
2r 2t
medium advisory

Dell ECS and ObjectScale Sensitive Information Logging Vulnerability (CVE-2026-28261)

Dell Elastic Cloud Storage and ObjectScale are vulnerable to local privilege escalation due to sensitive information being logged, potentially allowing a low-privileged attacker with local access to expose secrets and gain unauthorized access.

cve-2026-28261 secret-leak privilege-escalation
2r 1t 1c
critical advisory

CoolerControl Command Injection Vulnerability (CVE-2026-5208)

CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.

command-injection privilege-escalation coolercontrol
2r 1t 1c
critical advisory

IBM Verify Access and Security Verify Access Container Privilege Escalation (CVE-2026-1346)

A locally authenticated user can escalate privileges to root on vulnerable IBM Verify Identity Access Container and IBM Security Verify Access Container installations due to the execution of processes with unnecessary privileges, as tracked by CVE-2026-1346.

privilege-escalation cve-2026-1346 ibm
2r 1t 1c
high advisory

LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash

LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.

litellm authentication-bypass credential-access privilege-escalation
2r 1t
high advisory

ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)

An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.

cve-2026-39331 churchcrm authorization-bypass privilege-escalation web-application
2r 1t 1c
high advisory

PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)

PolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.

cve-2026-35610 privilege-escalation polarnl
2r 1t 1c 1i
critical advisory

Windmill Missing Authorization Vulnerability (CVE-2026-22683)

Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability (CVE-2026-22683) that allows users with the Operator role to bypass intended restrictions and perform unauthorized entity creation and modification actions via the backend API, potentially leading to privilege escalation and remote code execution.

windmill authorization-bypass privilege-escalation remote-code-execution
2r 2t 1c
high advisory

runZero Platform Superuser Privilege Escalation (CVE-2026-5373)

CVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.

privilege-escalation cve runzero
2r 1t 1c 3i
critical advisory

Red Hat Open Cluster Management (OCM) Cross-Cluster Privilege Escalation via Forged Certificates (CVE-2026-4740)

CVE-2026-4740 describes a vulnerability in Red Hat Open Cluster Management (OCM) where improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge certificates, enabling cross-cluster privilege escalation.

kubernetes privilege-escalation cve-2026-4740 ocm acm
2r 1t 1c 1i
critical advisory

GPUBreach: GPU Rowhammer Attack for Privilege Escalation

GPUBreach is a novel Rowhammer attack targeting GPUs, allowing privilege escalation to root shell by inducing bit flips in GDDR6 memory and exploiting memory-safety bugs in Nvidia drivers, posing a significant risk to shared cloud environments.

rowhammer privilege-escalation gpu cloud
2r 1t
critical advisory

Amelia WordPress Plugin IDOR Vulnerability CVE-2026-5465

The Amelia WordPress plugin is vulnerable to an insecure direct object reference, allowing authenticated attackers with Provider-level access or higher to escalate privileges and gain persistence by taking over any WordPress account, including Administrator by manipulating the `externalId` field.

wordpress amelia idor privilege-escalation
2r 1t 1c
critical advisory

Brave CMS Missing Authorization Leads to Privilege Escalation

Brave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.

cve-2026-35182 privilege-escalation web-application brave-cms
2r 1t 1c 1i
critical advisory

Twitch Studio Privilege Escalation Vulnerability (CVE-2024-14032)

Twitch Studio version 0.114.8 and prior contains a privilege escalation vulnerability (CVE-2024-14032) that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service, enabling them to overwrite system files and achieve full system compromise.

privilege-escalation cve-2024-14032 twitch
2r 1t 1c
high advisory

Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)

Sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.

privilege-escalation unquoted-service-path cve-2016-20061
2r 1t 1c 4i
critical advisory

Signal K Server Privilege Escalation via Unprotected /enableSecurity Endpoint

The Signal K server is vulnerable to privilege escalation due to the /skServer/enableSecurity endpoint remaining active after initial setup, allowing unauthenticated users to inject a new admin account and gain full server control; this affects versions prior to 2.24.0-beta.4.

privilege-escalation web-application vulnerability
2r 1t 1c
high advisory

Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification

An authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.

juju resource-poisoning privilege-escalation cloud
2r 2t 1c
high advisory

Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)

A context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.

electron context-isolation javascript xss CVE-2026-34780 defense-evasion privilege-escalation
2r 2t 1c
high advisory

AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions

AIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.

cve-2025-7024 privilege-escalation windows
2r 1t 1c
high advisory

Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)

Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.

ajenti authorization-bypass privilege-escalation CVE-2026-35175
2r 1t
high advisory

Sudo Privilege Escalation Vulnerability (CVE-2026-35535)

CVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.

sudo privilege-escalation cve-2026-35535
2r 1t 1c
high advisory

OpenClaw Incomplete Scope Clearing Allows Privilege Escalation

An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.

privilege-escalation web-application openclaw
2r 1t
critical advisory

CVE-2026-33105 - Microsoft Azure Kubernetes Service Privilege Escalation

CVE-2026-33105 is a critical vulnerability in Microsoft Azure Kubernetes Service that allows an unauthorized attacker to elevate privileges over a network due to improper authorization.

azure kubernetes privilege-escalation
2r 1t 1c 2i
critical advisory

Azure Databricks SSRF Vulnerability (CVE-2026-33107) Allows Privilege Escalation

A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-33107, exists in Azure Databricks, allowing an unauthorized attacker to elevate privileges over a network.

ssrf azure databricks privilege-escalation
2r 1t 1c
high advisory

CVE-2024-44250: macOS Sequoia Privilege Escalation Vulnerability

CVE-2024-44250 is a permission issue in macOS Sequoia 15.1 that allows an application to execute arbitrary code outside of its sandbox or with elevated privileges, potentially leading to full system compromise.

privilege-escalation macos cve-2024-44250
2r 1t 1c
critical advisory

HiSecOS Web Server Privilege Escalation Vulnerability (CVE-2023-7342)

CVE-2023-7342 allows authenticated users with operator or auditor roles in HiSecOS web server to escalate privileges to administrator by sending specially crafted packets, potentially granting full administrative access.

privilege-escalation web-server hisecos
2r 1t 1c
medium advisory

OpenSSH scp Insecure File Permission Vulnerability (CVE-2026-35385)

OpenSSH versions before 10.3 allow for the potential installation of setuid or setgid files when using scp to download files as root with the -O option (legacy SCP protocol) and without the -p option (preserve mode), contrary to user expectations.

openssh scp privilege-escalation cve-2026-35385
2r 1t 1c
high advisory

Balena Etcher for Windows TOCTOU Vulnerability

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.

privilege-escalation toctou balena-etcher
2r 1t 1c
high advisory

Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)

CVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.

keycloak uma policy-bypass privilege-escalation
2r 3t 1c
high advisory

Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)

An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.

keycloak privilege-escalation authorization
2r 1t 1c
medium advisory

SSH Authorized Key File Modification Inside a Container

The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.

container persistence lateral-movement privilege-escalation ssh
2r 4t
high advisory

HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)

HCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.

cve-2026-21765 privilege-escalation windows hcl-bigfix
2r 2t 1c
medium advisory

Open WebUI Broken Access Control Vulnerability (CVE-2026-34222)

A broken access control vulnerability in Open WebUI versions prior to 0.8.11 (CVE-2026-34222) allows authenticated users to potentially access or modify tool values they should not be authorized to, leading to privilege escalation and unauthorized configuration changes.

broken-access-control web-application privilege-escalation
2r 3t 1c
high advisory

Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)

Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.

lakeside systrack privilege-escalation race-condition cve-2026-35099 windows
2r 1t 1c
medium advisory

Dell AppSync 4.6.0 UNIX Symbolic Link Following Vulnerability (CVE-2026-22767)

Dell AppSync version 4.6.0 is vulnerable to a UNIX Symbolic Link (Symlink) Following vulnerability (CVE-2026-22767) that allows a low-privileged local attacker to tamper with information.

symlink dell appsync privilege-escalation
2r 1t 1c
high advisory

Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability

Dell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.

dell appsync privilege-escalation cve-2026-22768
2r 1t 1c
high advisory

cPanel/WHM Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.

privilege-escalation cpanel whm
2r 1t
critical advisory

Weaponization of Google Vertex AI Agents

Researchers demonstrated that AI agents built on Google's Vertex AI can be compromised to exfiltrate data, create backdoors, and compromise infrastructure by abusing excessive permissions of the Per-Project, Per-Product Service Agent (P4SA).

cloud ai vertex-ai privilege-escalation
2r 8t
high advisory

CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer

An application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.

privilege-escalation cve-2026-3780 untrusted-search-path dll-hijacking installer
2r 1t 1c
high advisory

OpenClaw Gateway Unauthorized Session Reset Vulnerability

A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.

openclaw session-reset privilege-escalation
2r 1t
high advisory

SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)

SciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.

authorization-bypass privilege-escalation cve
2r 1t 1c
high advisory

NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)

CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.

cve-2026-24154 nvidia jetson initrd command injection privilege escalation
2r 5t 1c 1i
high advisory

Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)

A security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.

containerization authorization bypass privilege escalation cve-2026-34040
2r 2t 1c 2i
medium advisory

Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)

CVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.

vulnerability privilege-escalation symantec dlp windows
2r 1t
medium advisory

Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation

Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

privilege-escalation defense-evasion persistence initial-access active-directory
2r 4t
critical advisory

Gigabyte Control Center Arbitrary File Write Vulnerability

Gigabyte Control Center has an Arbitrary File Write vulnerability (CVE-2026-4415) that allows unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

cve-2026-4415 arbitrary-file-write privilege-escalation code-execution gigabyte
2r 2t
critical advisory

OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)

OpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.

replay-attack privilege-escalation device-pairing
2r 2t 1i
critical advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-32922)

OpenClaw before 2026.3.11 is vulnerable to privilege escalation in the device.token.rotate function, allowing attackers with limited operator.pairing scope to mint tokens with elevated operator.admin privileges, potentially leading to remote code execution.

privilege-escalation remote-code-execution cve
2r 2t 2i
high advisory

OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.

sandbox-escape privilege-escalation cve-2026-32915
2r 2t
high advisory

OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.

insufficient-access-control privilege-escalation web-application
2r 1t 3i
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
high advisory

@mobilenext/mobile-mcp Path Traversal Vulnerability

The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.

path-traversal file-write privilege-escalation persistence
2r 2t
high advisory

LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)

An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.

libpng png oob CVE-2026-33636 vulnerability defense-evasion privilege-escalation
2r 2t
critical advisory

Incus Instance Template Vulnerability CVE-2026-33897

A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.

incus template-injection privilege-escalation CVE-2026-33897 linux
3r 1t
high advisory

HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)

A missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.

privilege-escalation access-control web-application
2r 1t 1i
critical advisory

Masteriyo LMS WordPress Plugin Privilege Escalation Vulnerability

The Masteriyo LMS plugin for WordPress is vulnerable to privilege escalation, allowing authenticated users with student-level access or higher to gain administrator privileges by manipulating the 'InstructorsController::prepare_object_for_database' function.

wordpress privilege-escalation cve-2026-4484
2r 1t
high advisory

IBM WebSphere Application Server Liberty Multiple Vulnerabilities

A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.

websphere vulnerability privilege-escalation defense-evasion information-disclosure
2r 3t
high advisory

RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.

kubernetes privilege-escalation cloud
2r 1t
critical advisory

Firefox Netmonitor Privilege Escalation Vulnerability (CVE-2026-4717)

CVE-2026-4717 is a critical privilege escalation vulnerability in the Netmonitor component of Firefox, Firefox ESR, and Thunderbird, potentially allowing an attacker to gain elevated privileges on a vulnerable system.

privilege-escalation firefox thunderbird cve-2026-4717
2r 1t 1i
high advisory

JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow

JetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.

buffer-overflow privilege-escalation execution windows
2r 2t 5i
high advisory

OpenSSH Vulnerabilities Allow Local Code Execution

A local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.

openssh code-execution privilege-escalation
2r 1t
high advisory

Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)

CVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.

incorrect-authorization privilege-escalation web-application
2r 1t
critical advisory

Blinko Privilege Escalation via upsertUser Endpoint

An authenticated user can exploit the Blinko upsertUser endpoint to escalate privileges, modify other users' passwords, and achieve account takeover due to missing authentication and verification checks.

privilege-escalation cve-2026-23480 blinko
2r 1t
high advisory

WWBN AVideo Privilege Escalation via Moderator Account

WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.

avideo privilege-escalation web-application
2r 1t
critical advisory

Iperius Backup 6.1.0 Privilege Escalation via Malicious Backup Jobs (CVE-2019-25608)

Iperius Backup 6.1.0 is vulnerable to privilege escalation, allowing low-privilege users to execute arbitrary programs with elevated privileges by creating malicious backup jobs that execute pre- or post-backup scripts with SYSTEM privileges.

privilege escalation cve-2019-25608 iperius backup
2r 2t
high advisory

Notepad2 PROPSYS.dll Uncontrolled Search Path Vulnerability (CVE-2026-4545)

CVE-2026-4545 describes a vulnerability in Flos Freeware Notepad2 4.2.25, where manipulating PROPSYS.dll leads to an uncontrolled search path, potentially allowing a local attacker to execute arbitrary code with elevated privileges.

cve uncontrolled search path privilege escalation
2r 1t
critical advisory

MiniFtp Buffer Overflow Vulnerability (CVE-2019-25611)

MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function allowing local attackers to execute arbitrary code by supplying oversized configuration values in the miniftpd.conf file.

cve-2019-25611 buffer-overflow privilege-escalation miniftp
2r 2t
critical advisory

Axessh 4.2 Stack-Based Buffer Overflow Vulnerability

Axessh 4.2 is vulnerable to a stack-based buffer overflow in the log file name field, allowing local attackers to execute arbitrary code by supplying an excessively long filename.

buffer-overflow privilege-escalation cve-2019-25607
2r 2t 6i
medium advisory

Inner Warden Security Agent Capabilities

The open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.

ebpf security-agent autonomous-response privilege-escalation c2-blocking linux
2r 1t
high advisory

Potential snap-confine Privilege Escalation via CVE-2026-3888

An unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.

privilege-escalation linux cve-2026-3888
2r 1t
high advisory

RegPwnBOF Registry Symlink Race Condition Exploit

RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.

registry symlink race-condition accessibility privilege-escalation persistence windows
2r 2t
critical advisory

Ubuntu 24.04 Snapd Local Privilege Escalation (CVE-2026-3888)

CVE-2026-3888 allows a local attacker to escalate privileges to root on Ubuntu 24.04 systems due to a vulnerability in the snapd service.

privilege-escalation snapd ubuntu CVE-2026-3888
2r 1t
critical advisory

CrackArmor: AppArmor Flaws Enable Local Privilege Escalation

Qualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.

apparmor privilege-escalation linux
2r 1t
critical advisory

Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution

Multiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.

veeam rce vulnerability privilege-escalation
2r 3t
high advisory

RegPwn Windows Local Privilege Escalation Vulnerability

RegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.

windows lpe privilege-escalation
2r 1t
medium advisory

Kubernetes Sensitive Role Creation or Modification

This rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.

kubernetes rbac privilege-escalation persistence
2r 2t
low advisory

AWS STS Role Assumption by User

Detection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.

aws privilege-escalation lateral-movement
2r 2t
critical advisory

VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation

Multiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).

vmware aria-operations rce privilege-escalation
2r 2t 3i
medium advisory

Suspicious AWS EC2 Key Pair Import Activity

The import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.

Elastic Compute Cloud aws cloudtrail ec2 keypair initial-access persistence privilege-escalation
2r 1t
critical advisory

OpenC3 COSMOS Script Runner Permissions Bypass

The OpenC3 COSMOS Script Runner widget allows authenticated users to bypass API permissions checks and execute administrative actions by running specially crafted Python and Ruby scripts, leading to data manipulation and privilege escalation.

openc3 cosmos script-runner permissions-bypass privilege-escalation
2r 1t
medium advisory

Active Directory Group Modification by SYSTEM Account

Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.

Active Directory persistence privilege-escalation windows
2r 2t
medium advisory

GitHub SSH Certificate Configuration Changed

Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.

Github ssh certificate initial-access persistence privilege-escalation stealth t1078.004
2r 4t
medium advisory

Potential Privilege Escalation via SUID/SGID on Linux

Attackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.

Elastic Defend privilege-escalation persistence defense-evasion suid sgid
2r 2t
medium advisory

Kubernetes Admission Controller Modification

An adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.

kubernetes admission-controller privilege-escalation persistence credential-access
2r 2t
high advisory

Evolver Path Traversal Vulnerability in `fetch` Command

A path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.

@evomap/evolver path-traversal arbitrary-file-write privilege-escalation evolver
2r 2t
medium advisory

Unsigned DLL Loaded by DNS Service

The rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.

Elastic Defend privilege-escalation execution persistence windows
2r 3t
high advisory

SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation

A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.

SimpleHelp privilege-escalation missing-authorization cloud
2r 1t 1c
high advisory

Okta Admin Console Unusual Behavior Detection

This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.

Okta Identity Engine okta identity privilege-escalation persistence defense-evasion initial-access
2r 4t
high advisory

Grafana Privilege Escalation Vulnerability

A remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.

Grafana privilege-escalation web-application
2r 1t
medium advisory

Azure AD Certificate-Based Authentication Enabled

Enabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.

Azure Active Directory azure certificate-based-authentication persistence privilege-escalation
2r 1t
high advisory

Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation

A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.

Saltcorn Data privilege-escalation web-application cloud
2r 1t
medium advisory

Potential Account Takeover via Mixed Logon Types

A Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.

account-takeover privilege-escalation windows
2r 1t
medium advisory

Expired or Revoked Driver Loaded

An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.

Elastic Defend privilege-escalation defense-evasion windows
2r 3t
low advisory

Detection of New GitHub Actions Secrets Creation

This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.

GitHub Actions github persistence privilege-escalation initial-access
3r 3t
medium advisory

Azure AD Authentication from Unexpected Geo-locations

Detection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.

Azure Active Directory azuread authentication geo-location unauthorized-access credential-compromise privilege-escalation
2r 1t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
medium advisory

Active Directory msPKIAccountCredentials Modification

Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.

Active Directory privilege-escalation credential-roaming active-directory windows
2r 2t
medium advisory

Google Workspace Suspicious Login Activity

Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.

Google Workspace initial-access privilege-escalation defense-evasion persistence gworkspace
3r 1t
high advisory

First Time Seen Account Performing DCSync

Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.

Active Directory credential-access privilege-escalation windows active-directory
2r 1t
medium advisory

Unusual Process Performing NewCredentials Logon

Anomalous NewCredentials logon events triggered by uncommon processes may indicate access token manipulation for privilege escalation.

privilege-escalation token-manipulation windows
2r 1t
low advisory

Unusual Group Name Accessed by User via Privileged Access Detection

A machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.

privileged-access-detection privilege-escalation windows
2r 5t
medium advisory

Potential Privilege Escalation via SUID/SGID Abuse on Linux

This rule detects potential privilege escalation attempts on Linux systems by identifying processes running with root privileges but initiated by non-root users, indicative of SUID/SGID abuse.

Elastic Defend privilege-escalation persistence suid sgid
2r 3t
medium advisory

UAC Bypass via Windows Firewall MMC Snap-In Hijack

Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.

Windows uac-bypass privilege-escalation windows-firewall mmc
2r 2t
high advisory

Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection

Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.

Windows defense-evasion privilege-escalation process-injection
2r 2t
medium advisory

Okta Admin Role Assignment Creation

Detection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.

Okta identity privilege-escalation persistence
2r 1t
medium advisory

Azure Authentication Method Change Detection

An attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.

Azure persistence privilege-escalation
2r 3t
medium advisory

AWS KMS Key Policy Updated via PutKeyPolicy

Detection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.

KMS cloud aws privilege-escalation defense-evasion
2r 2t
high advisory

Admidio Inverted 2FA Reset Allows Privilege Escalation

A logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.

admidio 2fa bypass privilege-escalation
2r 2t
medium advisory

Detection of Sensitive LDAP Attribute Access

This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.

Active Directory +1 credential-access privilege-escalation collection windows
2r 5t
medium advisory

Unauthorized Removal of Azure Conditional Access Policy

An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.

Azure Active Directory azure conditional-access privilege-escalation credential-access persistence defense-impairment
2r 3t
low advisory

Account Discovery Command via SYSTEM Account

The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.

Elastic Defend +5 discovery privilege-escalation windows
3r 3t
medium advisory

Suspicious WerFault Child Process Abuse

This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.

Microsoft Defender XDR +2 defense-evasion persistence privilege-escalation masquerading
2r 3t
medium advisory

UAC Bypass via DiskCleanup Scheduled Task Hijack

Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.

Defender XDR +1 uac-bypass privilege-escalation windows diskcleanup scheduled-task
2r 3t
medium advisory

Kubernetes Sensitive Role Creation or Modification

Detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.

Kubernetes rbac privilege-escalation persistence
2r 2t
medium advisory

Azure AD Bitlocker Key Retrieval

An adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.

Azure Active Directory azure bitlocker key-retrieval persistence privilege-escalation
2r 3t
high advisory

Azure PIM Elevation Approved or Denied

Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.

Azure pim privilege-escalation persistence
2r 3t
high advisory

Azure AD User Added to Global or Device Admin Role

An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.

Azure Active Directory azuread role-assignment privilege-escalation persistence
2r 3t
high advisory

Kubernetes RBAC Wildcard Elevation on Existing Role

The rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.

kubernetes rbac privilege-escalation
2r 1t
high advisory

Azure PIM Role Activation Without MFA

Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.

Azure pim mfa privilege-escalation
2r 1t
medium advisory

Suspicious AWS SAML Activity Detection

This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.

AWS IAM +1 aws saml cloudtrail initial-access lateral-movement persistence privilege-escalation stealth
2r 3t
high advisory

Detect Application AppID URI Configuration Changes in Azure

Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.

Azure Active Directory azure appid uri application serviceprincipal credential-access privilege-escalation
2r 2t
medium advisory

Malicious Azure Kubernetes Admission Controller Configuration

An adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.

azure kubernetes admission-controller persistence privilege-escalation credential-access
2r 4t
high advisory

Azure AD Temporary Access Pass Added to Account

Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.

Azure Active Directory azuread temporary-access-pass privilege-escalation initial-access persistence
2r 4t
high advisory

Windows Service Security Descriptor Tampering via sc.exe

Adversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.

Splunk Enterprise +2 defense-evasion privilege-escalation windows
2r 2t
medium advisory

Suspicious Modification of Sensitive Linux Files

This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.

file-integrity privilege-escalation persistence linux
3r 1t
low advisory

Spike in Special Privilege Use Events

A machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.

privileged-access-detection privilege-escalation windows
2r 4t
high advisory

Nsenter to PID Namespace via Auditd

This rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.

privilege-escalation linux container
2r 1t
medium advisory

Azure AD User Password Reset Detection

Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.

Azure Active Directory azure password-reset privilege-escalation initial-access persistence credential-access stealth
2r 1t
medium advisory

Azure AD Guest to Member User Type Conversion

An adversary may convert a guest user account to a member account in Azure Active Directory to elevate privileges and gain persistent access to resources.

Azure Active Directory privilege-escalation azure entra guest-account
2r 1t
medium advisory

Linux Cron File Creation for Persistence

An attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.

persistence privilege-escalation linux
2r 1t
high advisory

Detection of Privileged Identity Management (PIM) Settings Modifications

Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.

Azure Active Directory azure pim privilege-escalation persistence
2r 4t
high advisory

AWS IAM User or Access Key Creation via S3 Browser

The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.

AWS IAM cloud aws iam privilege-escalation persistence
2r 2t
high advisory

Azure Application URI Configuration Modification

Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.

Azure Active Directory cloud azure application uri modification persistence credential-access privilege-escalation
3r 4t
low advisory

MSBuild Process Injection Detection

The Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.

MSBuild defense-evasion privilege-escalation process-injection
2r 3t
high advisory

WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106

Highland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.

Custom Role Manager plugin privilege-escalation wordpress cve
2r 1t 1c
medium advisory

User Removed from Group with Conditional Access Policy Modification Access

An attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.

Azure Active Directory azure conditional-access privilege-escalation
2r 3t
medium advisory

Unusual Process Connecting to Docker or Containerd Socket

An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.

Auditbeat +4 container privilege-escalation lateral-movement linux
2r 3t
medium advisory

Unused Privileged Identity Management (PIM) Roles in Azure

Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.

Azure pim privileged-identity-management role-based-access-control initial-access privilege-escalation
2r 1t
medium advisory

Unauthorized Guest User Invitation Attempt in Azure

Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.

Azure privilege-escalation initial-access persistence stealth
2r 1t
medium advisory

Unauthorized Conditional Access Policy Creation in Azure AD

An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.

Azure Active Directory azure conditional-access privilege-escalation attack.privilege-escalation attack.t1548
2r 1t
medium advisory

UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer

This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.

Microsoft Defender XDR +2 uac-bypass privilege-escalation com ieinstal
2r 3t
high advisory

Suspicious SUID Binary Execution on Linux

This rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.

privilege-escalation suid linux
3r 2t
medium advisory

Suspicious AWS STS GetSessionToken Usage

The AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.

AWS CloudTrail aws cloud lateral-movement privilege-escalation sts GetSessionToken
2r 2t
medium advisory

SeDebugPrivilege Enabled by a Suspicious Process

The rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.

Windows privilege-escalation token-manipulation
2r 1t
medium advisory

Registry Persistence via AppCert DLL Modification

Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.

Elastic Defend +3 persistence privilege-escalation appcert-dll
2r 2t
medium advisory

Process Created with a Duplicated Token

This rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.

Windows privilege-escalation token-impersonation
2r 2t
high advisory

Privileged Identity Management (PIM) Alerting Disabled

An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.

Azure pim alerts privilege-escalation persistence
2r 1t
high threat

Potential Vcruntime140 DLL Sideloading

Detects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.

Visual C++ Redistributable APT29 +5 dll-sideloading vcruntime140.dll wineloader defense-evasion persistence privilege-escalation
2r 3t
medium advisory

Potential Port Monitor or Print Processor Registration Abuse

This rule detects registry modifications indicative of privilege escalation and persistence attempts by adversaries abusing port monitors and print processors to execute malicious DLLs with SYSTEM privileges on Windows systems.

privilege-escalation persistence windows
2r 4t
medium advisory

Potential LSA Authentication Package Abuse

Adversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.

Microsoft Defender XDR +1 privilege-escalation persistence windows
2r 2t
high advisory

Outbound SMB Traffic Detection

This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.

Secure Firewall Threat Defense +4 network smb lateral-movement privilege-escalation
2r 1t
medium advisory

Okta Group Privilege Change Spike via ML Detection

A machine learning job has identified an unusual spike in Okta group privilege change events, indicating potential privileged access activity where attackers might be elevating privileges by adding themselves or compromised accounts to high-privilege groups, enabling further access or persistence.

okta privilege-escalation machine-learning
2r 4t
low advisory

Okta Group Application Assignment Spike Indicates Privilege Escalation

A machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.

privileged-access privilege-escalation okta
2r 4t
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
medium advisory

GPO Scheduled Task or Service Creation/Modification

Detection of the creation or modification of new Group Policy based scheduled tasks or services, which can be abused by attackers with domain admin permissions to execute malicious payloads remotely on domain-joined machines, leading to privilege escalation and persistence.

Elastic Defend +2 group-policy privilege-escalation persistence windows
2r 3t
medium advisory

GPO Scheduled Task Abuse for Privilege Escalation and Lateral Movement

Attackers abuse Group Policy Objects by modifying scheduled task attributes to execute malicious commands across objects controlled by the GPO, potentially leading to privilege escalation and lateral movement.

group-policy scheduled-task privilege-escalation lateral-movement
2r 3t
medium advisory

GPO Modification to Add Startup/Logon Scripts

This rule detects the modification of Group Policy Objects (GPO) to add a startup or logon script to user or computer objects, enabling attackers to achieve privilege escalation and persistence by executing arbitrary commands at scale.

group-policy privilege-escalation persistence windows
2r 3t
high advisory

Frequent Azure PIM Role Activation Detected

Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.

Azure pim role-activation privilege-escalation
2r 3t
medium advisory

First Time Seen Driver Loaded

The rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.

Elastic Defend privilege-escalation persistence windows
2r 3t
high advisory

Executable or Script Creation in Temporary Paths

Adversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.

defense-evasion persistence privilege-escalation execution temp-directory file-creation
2r 1t
medium advisory

Detection of Privileged Account Creation in Azure

Detects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.

Azure privileged-account initial-access persistence privilege-escalation
2r 3t
medium advisory

Detection of Okta Administrator Role Assignment to User or Group

Detects the assignment of an Okta administrator role to a user or group, potentially indicating privilege escalation or persistence attempts by malicious actors.

Okta privilege-escalation persistence
2r 1t
low advisory

Component Object Model (COM) Hijacking via Registry Modification

Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.

Elastic Defend +9 persistence com-hijacking windows registry defense-evasion privilege-escalation
2r 4t
medium advisory

Chmod Activity Targeting Sensitive Linux Directories

Attackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.

defense-evasion privilege-escalation persistence linux
2r 1t
high advisory

Azure Subscription Permission Elevation via Activity Logs

An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.

Azure privilege-escalation persistence initial-access stealth
2r 1t
high advisory

AWS STS GetFederationToken with AdministratorAccess in Request

Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.

AWS STS aws privilege-escalation lateral-movement sts getfederationtoken
2r 2t
medium advisory

AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation

Successful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.

Amazon Web Services privilege-escalation aws iam
2r 2t
high advisory

AWS EC2 Stop, Start, and User Data Modification Correlation

Detection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.

EC2 aws user-data privilege-escalation persistence execution
3r 2t
high advisory

AWS EC2 Instance Profile Associated with Running Instance

An attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.

EC2 +1 aws privilege-escalation lateral-movement
2r 2t
high advisory

Avo Framework Broken Access Control Vulnerability

Avo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.

avo broken-access-control privilege-escalation ruby
2r 1t
critical advisory

Actual Privilege Escalation via change-password Endpoint on OpenID-Migrated Servers

Any authenticated user can escalate to ADMIN on Actual servers migrated from password authentication to OpenID Connect by exploiting a lack of authorization checks, orphaned password rows, and client-controlled login methods, leading to full administrative privileges.

@actual-app/sync-server privilege-escalation web-application
2r 1t
medium advisory

Unusual Parent-Child Relationship Detection

This rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows process-injection masquerading access-token-manipulation parent-pid-spoofing
3r 4t
medium advisory

Potential Persistence via Time Provider Modification

Adversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.

Windows +1 persistence privilege-escalation time-provider
2r 2t
medium advisory

Potential Application Shimming via Sdbinst

Attackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.

Windows +1 persistence privilege-escalation application-shimming
2r 2t
high advisory

Logon Script Registry Modification for Persistence and Privilege Escalation

This brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.

Splunk Enterprise +2 persistence privilege-escalation windows
2r 2t
high advisory

Executable or Script Creation in Suspicious Paths

This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.

Windows defense-evasion persistence privilege-escalation execution
2r 1t
high advisory

Azure AD Account Created and Deleted Within a Close Time Frame

Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.

Azure Active Directory privilege-escalation persistence initial-access stealth account-manipulation
2r 3t
low advisory

Unusual Privilege Type Assigned to User via Machine Learning Anomaly

A machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.

privileged-access privilege-escalation windows
2r 4t
medium advisory

AWS Root Account Usage Detected

The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.

AWS CloudTrail cloud aws privilege-escalation initial-access persistence stealth
3r 3t
medium advisory

Unauthorized Guest User Invitations in Azure AD

Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.

azure azuread guest-user privilege-escalation persistence initial-access
2r 3t
medium advisory

Suspicious Unshare Usage for Namespace Manipulation

The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.

Elastic Defend +3 privilege-escalation container-escape linux
2r 2t
medium advisory

Suspicious Unshare Usage for Container Escape and Privilege Escalation

The rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.

Elastic Defend for Containers privilege-escalation container-escape linux
2r 2t
low advisory

Service Control Executed from Script Interpreters

Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.

Elastic Defend +2 privilege-escalation defense-evasion execution windows service-creation
2r 8t
high advisory

S3 Browser Used to Create IAM Login Profiles

The S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.

AWS IAM aws cloud iam s3browser privilege-escalation persistence
2r 2t
medium advisory

Potential Credential Access via DCSync

This rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.

Azure AD Connect credential-access privilege-escalation windows active-directory
2r 3t
high advisory

OpenRemote Improper Access Control Leads to Privilege Escalation

OpenRemote is vulnerable to privilege escalation, allowing an attacker with write:admin privileges in one Keycloak realm to gain administrator access to the master realm by manipulating Keycloak realm roles due to missing authorization checks in the updateUserRealmRoles function.

openremote-manager privilege-escalation access-control openremote
2r 1t
low advisory

Okta Privileged Operations from Unusual Host Name Detected

A machine learning job detected a user performing privileged operations in Okta from an uncommon device, potentially indicating a compromised account or insider threat attempting privilege escalation.

privileged-access-detection okta machine-learning privilege-escalation
2r 2t
low advisory

Okta Group Membership Spike Detection

A machine learning job has identified an unusual spike in Okta group membership events, indicating potential privileged access activity where attackers or malicious insiders might be adding accounts to privileged groups to escalate their access, potentially leading to unauthorized actions or data breaches.

privileged-access privilege-escalation okta
2r 4t
high advisory

Nsenter Execution with Target Flag Inside Container

The rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.

Defend for Containers container privilege-escalation linux
2r 1t
medium advisory

Disabling User Account Control via Registry Modification

Attackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows
2r 3t
medium advisory

Azure Domain Federation Settings Modified

An attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.

Azure Active Directory azure federation privilege-escalation persistence initial-access
2r 2t
medium advisory

Windows Privilege Escalation via Secondary Logon Service

The rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.

Windows privilege-escalation access-token-manipulation
2r 2t