CWE-250

Execution with Unnecessary Privileges

87 CVEs Avg CVSS 7.4 MITRE
13
CRITICAL
43
HIGH
26
MEDIUM
1
LOW
8
POC
0
KEV

Monthly

CVE-2026-33793 HIGH This Week

Local privilege escalation in Juniper Networks Junos OS and Junos OS Evolved allows low-privileged authenticated users to execute arbitrary code with root privileges. When unsigned Python operation scripts are enabled in device configuration, attackers can inject and execute malicious op scripts under root-equivalent context, achieving complete system compromise. Affects all Junos OS versions before 22.4R3-S7 and multiple branches through 24.4, plus corresponding Junos OS Evolved releases. No public exploit identified at time of analysis. CVSS 8.5 (High) with local attack vector requiring low privileges and no user interaction.

Privilege Escalation Juniper Python Junos Os Junos Os Evolved
NVD
CVSS 4.0
8.5
EPSS
0.0%
CVE-2026-4498 HIGH This Week

Authenticated Kibana users with Fleet management privileges can read Elasticsearch index data beyond their intended RBAC permissions through debug route handlers in the Fleet plugin. This scope bypass affects Elastic Kibana deployments where users hold Fleet sub-feature privileges (agent policies, settings management). The vulnerability requires low-privilege authentication (PR:L) and has network attack vector (AV:N) with low complexity (AC:L), enabling cross-scope data confidentiality breach (S:C/C:H). No public exploit identified at time of analysis. EPSS data not available, but the specific privilege escalation vector and remote exploitability warrant prioritization in Kibana Fleet deployments.

Privilege Escalation Elastic
NVD VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-1346 CRITICAL PATCH Act Now

Local privilege escalation to root in IBM Verify/Security Verify Access products 10.0-11.0.2 allows unauthenticated local users to gain full system control via excessive process privileges (CWE-250). The CVSS 9.3 score reflects local attack vector but no authentication requirement (PR:N) and complete system compromise with scope change. Patch available per vendor advisory. No public exploit identified at time of analysis, though the local attack vector and low complexity (AC:L) suggest straightforward exploitation once local access is obtained.

IBM Privilege Escalation
NVD VulDB
CVSS 3.1
9.3
EPSS
0.0%
CVE-2026-34877 CRITICAL Act Now

Mbed TLS versions 2.19.0 through 3.6.5 and 4.0.0 allow remote code execution through memory corruption when attackers modify serialized SSL context or session structures. The vulnerability stems from insufficient validation of deserialized data, enabling arbitrary code execution on systems using affected versions. CISA KEV status and active exploitation data not confirmed in provided intelligence.

RCE Privilege Escalation Buffer Overflow
NVD VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25212 CRITICAL Act Now

Percona PMM before version 3.7 allows authenticated remote code execution through improper privilege management in its internal database user. An attacker with pmm-admin credentials can leverage the 'Add data source' feature to escape database isolation and execute arbitrary shell commands on the underlying operating system, requiring only valid pmm-admin access rather than direct system-level privileges.

Privilege Escalation
NVD
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-4606 CRITICAL Act Now

GV Edge Recording Manager (ERM) v2.3.1 improperly executes application components with SYSTEM-level privileges, allowing any local user to escalate privileges and gain full control of the operating system. The vulnerability stems from the Windows service running under the LocalSystem account and spawning child processes with elevated privileges, particularly when file dialogs are invoked during operations like data import. This is a local privilege escalation vulnerability with high real-world risk due to the ease of exploitation and the severity of the impact.

Privilege Escalation Microsoft Gv Edge Recording Manager Windows
NVD VulDB
CVSS 4.0
10.0
EPSS
0.0%
CVE-2025-69783 HIGH This Week

A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe).

Privilege Escalation
NVD GitHub VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-12690 This Week

Execution with unnecessary privileges in Forcepoint NGFW Engine allows local privilege escalation.This issue affects NGFW Engine versions up to 6.10.19 is affected by execution with unnecessary privileges.

Privilege Escalation
NVD VulDB
EPSS
0.0%
CVE-2026-3315 This Week

Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assignment for Critical Resource vulnerability in ASSA ABLOY Visionline on Windows allows Configuration/Environment Manipulation.This issue affects Visionline: from 1.0 before 1.33.

Windows
NVD VulDB
EPSS
0.0%
CVE-2026-30225 MEDIUM POC PATCH This Month

OliveTin versions prior to 3000.11.1 contain an authentication bypass in RestartAction that allows authenticated users to execute shell commands beyond their assigned permissions. The vulnerability stems from improper request context handling that causes the system to fall back to guest user privileges, which may have broader access than the authenticated caller. Public exploit code exists for this medium-severity flaw that enables privilege escalation and unauthorized command execution.

Privilege Escalation Olivetin
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-33793
EPSS 0% CVSS 8.5
HIGH This Week

Local privilege escalation in Juniper Networks Junos OS and Junos OS Evolved allows low-privileged authenticated users to execute arbitrary code with root privileges. When unsigned Python operation scripts are enabled in device configuration, attackers can inject and execute malicious op scripts under root-equivalent context, achieving complete system compromise. Affects all Junos OS versions before 22.4R3-S7 and multiple branches through 24.4, plus corresponding Junos OS Evolved releases. No public exploit identified at time of analysis. CVSS 8.5 (High) with local attack vector requiring low privileges and no user interaction.

Privilege Escalation Juniper Python +2
NVD
CVE-2026-4498
EPSS 0% CVSS 7.7
HIGH This Week

Authenticated Kibana users with Fleet management privileges can read Elasticsearch index data beyond their intended RBAC permissions through debug route handlers in the Fleet plugin. This scope bypass affects Elastic Kibana deployments where users hold Fleet sub-feature privileges (agent policies, settings management). The vulnerability requires low-privilege authentication (PR:L) and has network attack vector (AV:N) with low complexity (AC:L), enabling cross-scope data confidentiality breach (S:C/C:H). No public exploit identified at time of analysis. EPSS data not available, but the specific privilege escalation vector and remote exploitability warrant prioritization in Kibana Fleet deployments.

Privilege Escalation Elastic
NVD VulDB
CVE-2026-1346
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

Local privilege escalation to root in IBM Verify/Security Verify Access products 10.0-11.0.2 allows unauthenticated local users to gain full system control via excessive process privileges (CWE-250). The CVSS 9.3 score reflects local attack vector but no authentication requirement (PR:N) and complete system compromise with scope change. Patch available per vendor advisory. No public exploit identified at time of analysis, though the local attack vector and low complexity (AC:L) suggest straightforward exploitation once local access is obtained.

IBM Privilege Escalation
NVD VulDB
CVE-2026-34877
EPSS 0% CVSS 9.8
CRITICAL Act Now

Mbed TLS versions 2.19.0 through 3.6.5 and 4.0.0 allow remote code execution through memory corruption when attackers modify serialized SSL context or session structures. The vulnerability stems from insufficient validation of deserialized data, enabling arbitrary code execution on systems using affected versions. CISA KEV status and active exploitation data not confirmed in provided intelligence.

RCE Privilege Escalation Buffer Overflow
NVD VulDB
CVE-2026-25212
EPSS 0% CVSS 9.9
CRITICAL Act Now

Percona PMM before version 3.7 allows authenticated remote code execution through improper privilege management in its internal database user. An attacker with pmm-admin credentials can leverage the 'Add data source' feature to escape database isolation and execute arbitrary shell commands on the underlying operating system, requiring only valid pmm-admin access rather than direct system-level privileges.

Privilege Escalation
NVD
CVE-2026-4606
EPSS 0% CVSS 10.0
CRITICAL Act Now

GV Edge Recording Manager (ERM) v2.3.1 improperly executes application components with SYSTEM-level privileges, allowing any local user to escalate privileges and gain full control of the operating system. The vulnerability stems from the Windows service running under the LocalSystem account and spawning child processes with elevated privileges, particularly when file dialogs are invoked during operations like data import. This is a local privilege escalation vulnerability with high real-world risk due to the ease of exploitation and the severity of the impact.

Privilege Escalation Microsoft Gv Edge Recording Manager +1
NVD VulDB
CVE-2025-69783
EPSS 0% CVSS 7.8
HIGH This Week

A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe).

Privilege Escalation
NVD GitHub VulDB
CVE-2025-12690
EPSS 0%
This Week

Execution with unnecessary privileges in Forcepoint NGFW Engine allows local privilege escalation.This issue affects NGFW Engine versions up to 6.10.19 is affected by execution with unnecessary privileges.

Privilege Escalation
NVD VulDB
CVE-2026-3315
EPSS 0%
This Week

Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assignment for Critical Resource vulnerability in ASSA ABLOY Visionline on Windows allows Configuration/Environment Manipulation.This issue affects Visionline: from 1.0 before 1.33.

Windows
NVD VulDB
CVE-2026-30225
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

OliveTin versions prior to 3000.11.1 contain an authentication bypass in RestartAction that allows authenticated users to execute shell commands beyond their assigned permissions. The vulnerability stems from improper request context handling that causes the system to fall back to guest user privileges, which may have broader access than the authenticated caller. Public exploit code exists for this medium-severity flaw that enables privilege escalation and unauthorized command execution.

Privilege Escalation Olivetin
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy