CWE-272

Least Privilege Violation

6 CVEs Avg CVSS 6.5 MITRE
0
CRITICAL
5
HIGH
0
MEDIUM
0
LOW
0
POC
0
KEV

Monthly

CVE-2025-9711 HIGH This Week

Fabric Operating System versions up to 9.2.1 contains a vulnerability that allows attackers to elevating the privileges of the local authenticated user to “root” using the exp (CVSS 7.8).

Information Disclosure Fabric Operating System
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-59106 HIGH This Week

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. [CVSS 8.8 HIGH]

Information Disclosure Dormakaba Access Manager 9200 K7 Firmware Dormakaba Access Manager 9200 K5 Firmware Dormakaba Access Manager 9290 K7 Firmware Dormakaba Access Manager 9230 K7 Firmware +2
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-23634 NONE PATCH Awaiting Data

Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors.

Kubernetes
NVD GitHub
EPSS
0.0%
CVE-2025-1384 HIGH This Week

CVE-2025-1384 is a least privilege violation (CWE-272) in the communication protocol between Omron NJ/NX-series Machine Automation Controllers and Sysmac Studio software that allows unauthenticated remote attackers to execute arbitrary code on affected controllers. The vulnerability affects industrial automation environments and enables complete compromise of controller functionality through unauthorized remote code execution. While the CVSS score of 7.0 indicates moderate-to-high severity, the network-accessible attack vector and lack of required privileges make this a significant threat to operational technology (OT) environments, particularly in manufacturing and critical infrastructure sectors.

Authentication Bypass Siemens RCE Privilege Escalation
NVD
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-49144 HIGH This Week

CVE-2025-49144 is a privilege escalation vulnerability in Notepad++ v8.8.1 and earlier that exploits insecure executable search paths in the installer to allow unprivileged local users to execute arbitrary code with SYSTEM privileges. An attacker can leverage social engineering to colocate a malicious executable with the legitimate installer in a writable directory (e.g., Downloads), and upon installer execution, the malicious payload runs with elevated privileges. The vulnerability is fixed in version 8.8.2.

Privilege Escalation
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-47809 HIGH This Month

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.

Microsoft Privilege Escalation Windows
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2025-9711
EPSS 0% CVSS 7.8
HIGH This Week

Fabric Operating System versions up to 9.2.1 contains a vulnerability that allows attackers to elevating the privileges of the local authenticated user to “root” using the exp (CVSS 7.8).

Information Disclosure Fabric Operating System
NVD
CVE-2025-59106
EPSS 0% CVSS 8.8
HIGH This Week

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. [CVSS 8.8 HIGH]

Information Disclosure Dormakaba Access Manager 9200 K7 Firmware Dormakaba Access Manager 9200 K5 Firmware +4
NVD
CVE-2026-23634
EPSS 0%
NONE PATCH Awaiting Data

Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors.

Kubernetes
NVD GitHub
CVE-2025-1384
EPSS 0% CVSS 7.0
HIGH This Week

CVE-2025-1384 is a least privilege violation (CWE-272) in the communication protocol between Omron NJ/NX-series Machine Automation Controllers and Sysmac Studio software that allows unauthenticated remote attackers to execute arbitrary code on affected controllers. The vulnerability affects industrial automation environments and enables complete compromise of controller functionality through unauthorized remote code execution. While the CVSS score of 7.0 indicates moderate-to-high severity, the network-accessible attack vector and lack of required privileges make this a significant threat to operational technology (OT) environments, particularly in manufacturing and critical infrastructure sectors.

Authentication Bypass Siemens RCE +1
NVD
CVE-2025-49144
EPSS 0% CVSS 7.3
HIGH This Week

CVE-2025-49144 is a privilege escalation vulnerability in Notepad++ v8.8.1 and earlier that exploits insecure executable search paths in the installer to allow unprivileged local users to execute arbitrary code with SYSTEM privileges. An attacker can leverage social engineering to colocate a malicious executable with the legitimate installer in a writable directory (e.g., Downloads), and upon installer execution, the malicious payload runs with elevated privileges. The vulnerability is fixed in version 8.8.2.

Privilege Escalation
NVD GitHub
CVE-2025-47809
EPSS 0% CVSS 8.2
HIGH This Month

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.

Microsoft Privilege Escalation Windows
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy