A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
History

Mon, 04 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 Aug 2025 20:45:00 +0000

Type Values Removed Values Added
Description A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
Title Agnitum Outpost Internet Security Local Privilege Escalation
Weaknesses CWE-22
CWE-306
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-01T20:37:55.129Z

Updated: 2025-08-04T13:50:49.631Z

Reserved: 2025-08-01T13:23:23.725Z

Link: CVE-2013-10046

cve-icon Vulnrichment

Updated: 2025-08-04T13:50:41.417Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-01T21:15:26.190

Modified: 2025-08-04T15:06:15.833

Link: CVE-2013-10046

cve-icon Redhat

No data.